Security and Vulnerability Management

Security and vulnerability management

A Call for Open Cybersecurity Middleware

Swisscom proposing a standard abstraction layer for integration and more rapid incident detection and response.

Cytegic helps enterprises assess their cybersecurity maturity level

The toolset helps enterprises get an understanding of their overall security posture and make strategic decisions about their security controls

U.S. Critical Infrastructure Continue to Make Risky IT Bets

More than half of critical infrastructure organizations admit that they have insecure IT products and services deployed on their networks.


How to identify and thwart insider threats

Are you the type? Insider archetypes map and model personalities and behaviors that could be clues to the next attack on your business.

U.S. Critical Infrastructure under Cyber-Attack

Majority of critical infrastructure organizations have experienced damaging and costly incidents over the past two years

My Take-Aways from Splunk .conf2015

User passion and a multitude of security use cases were on display in Las Vegas this week

bypass congress

CSOs aren’t waiting for cyber sharing legislation

While legislation to promote, and govern, the sharing of cyber threat information between the private and public sector remains stalled in Congress, many IT leaders say while they would welcome a bit more sharing from the government,...

Cyber Supply Chain Security Is Increasingly Difficult for Critical Infrastructure Organizations

New IT initiatives, and increase in IT suppliers, and consolidation of IT and operational technology (OT) make cyber supply chain security increasingly cumbersome

The Network’s Role as a Security Sensor and Policy Enforcer

Networks can (and should) be used to improve risk management as well as incident prevention, detection, and response

Challenges around Operationalizing Threat Intelligence

Beyond the information, process and skills improvements needed for threat intelligence collection, processing, analysis, and sharing

shellshocked bash bug

Extortion or fair trade? The value of bug bounties

Vendors without bug bounty programs risk the wrath of the infosec community, but such programs must be constructed carefully to yield optimal outcomes

breach detection hacker hacked thief

Sharpening cyber defenses with an “attacker’s eye view”

Looking at your organization from the outside in helps you understand who is likely to attack, why, how and where

Facebook’s Threat Intelligence Sharing Potential

Data management, scale, and algorithmic strengths may give Facebook an advantage in threat intelligence sharing

Incident Response: More Art than Science

Cybersecurity industry needs to establish best practices and open secure channels for incident response communications.

Enterprises are Analyzing Lots of Internal Cybersecurity Data

Enterprise organizations collect, process, and analyze a wide variety of cybersecurity data, and there is no end in sight.

Black Hat Boogie

My quick takes on an interesting, exhausting, and frightening week at Black Hat 2015 in Las Vegas

Black Hat Is About Cybersecurity People and Processes

Cybersecurity professionals attending Black Hat can gain in-depth knowledge about good guys, bad guys, and everyone in between

Cybersecurity Technology Integration Changes Everything

Based upon current and future cybersecurity technology integration trends, CISOs are adjusting budgets, organizations, skills, and vendor choices. Even industry analysts are impacted by cybersecurity technology integration.

parallels logo

Managing Apple Macs and Windows Systems with the Same SCCM Tool

Parallels releases latest in add-ons to Microsoft's System Center Configuration Manager to better manage Apple Macs in an integrated Windows environment.

Measuring the Quality of Commercial Threat Intelligence

One person’s quality is another person’s fluff so objective measurements will be difficult. Threat intelligence quality may ultimately be gauged through crowdsourcing and threat intelligence sharing.

Load More