Quantcast
Browsing all 28 articles
Browse latest View live

[eBook] 26 Cyber Security Facts from the Last 12 Months

Here is compilation of 26 Cyber Security Facts that we have referenced throughout our blog over the last 12 months. This 4-page eBook contains categorized facts and links to the original public...

View Article


Automated Security Operations for Managed Security Service Providers (MSSP)

While the security automation conversation generally focuses on enterprise and government Security Operations Centers (SOC), one of the largest groups that can benefit from automation are Managed...

View Article


Cyber Attacks Are, Most Likely, an Inside Job

According to “The Federal Insider Threat Report,” published by MeriTalk, approximately 50 percent of federal agencies were targeted by inside threats in the past year. Forty percent were unintentional...

View Article

3 Burning Questions About Automating Vulnerability Lifecycle Management—Part 1

Vulnerability lifecycle management—the process of continually monitoring and managing an enterprise in order to identify, validate and remediate potential security risks—is critical for organizations...

View Article

Student Hacking: A Threat, but a Bigger Opportunity

Over the years we’ve seen massive cyber attacks on renowned brands like Ashley Madison, Target, Sony and Home Depot; however, not all attacks are aimed against corporations. Some of today’s most...

View Article


3 Burning Questions About Automating Vulnerability Lifecycle Management—Part 2

In Part 1 of this series we discussed what vulnerability lifecycle management is, and why automating this process is crucial for long-term success. In an effort to help educate organizations on...

View Article

3 Major Security Operations Mistakes

In a recent webinar, Swimlane Founder and CEO Cody Cornell elaborated on four major causes of unsustainable security operations: an unprecedented volume of attacks, alert fatigue, antiquated response...

View Article

Top 4 Causes of Unsustainable Security Operations

It shouldn’t come as a surprise that organizations are struggling to establish and maintain superior security operations methods. In fact, only 45 percent of global organizations are confident in their...

View Article


10 Hard-hitting Cyber Security Statistics

If one thing became clear in 2015, it was that no organization, regardless of its size or vertical, is safe from a data breach. A breach can happen to any organization at any time. Anthem, the IRS and...

View Article


Best Practices to Fortify Your Cyber Security Strategy

There’s no question that the Denver Broncos beat the Carolina Panthers thanks to their defense. Defense alone carried the Broncos while Peyton Manning was out earlier in the season, and it carried them...

View Article

3 Burning Questions About Automating Vulnerability Lifecycle Management—Part 1

Vulnerability lifecycle management—the process of continually monitoring and managing an enterprise in order to identify, validate and remediate potential security risks—is critical for organizations...

View Article

Student Hacking: A Threat, but a Bigger Opportunity

Over the years we’ve seen massive cyber attacks on renowned brands like Ashley Madison, Target, Sony and Home Depot; however, not all attacks are aimed against corporations. Some of today’s most...

View Article

3 Burning Questions About Automating Vulnerability Lifecycle Management—Part 2

In Part 1 of this series we discussed what vulnerability lifecycle management is, and why automating this process is crucial for long-term success. In an effort to help educate organizations on...

View Article


3 Major Security Operations Mistakes

In a recent webinar, Swimlane Founder and CEO Cody Cornell elaborated on four major causes of unsustainable security operations: an unprecedented volume of attacks, alert fatigue, antiquated response...

View Article

Top 4 Causes of Unsustainable Security Operations

It shouldn’t come as a surprise that organizations are struggling to establish and maintain superior security operations methods. In fact, only 45 percent of global organizations are confident in their...

View Article


10 Hard-hitting Cyber Security Statistics

If one thing became clear in 2015, it was that no organization, regardless of its size or vertical, is safe from a data breach. A breach can happen to any organization at any time. Anthem, the IRS and...

View Article

Best Practices to Fortify Your Cyber Security Strategy

There’s no question that the Denver Broncos beat the Carolina Panthers thanks to their defense. Defense alone carried the Broncos while Peyton Manning was out earlier in the season, and it carried them...

View Article


Two 2017 Cyber Security Trends Every Security Operations Professional Should...

Key Findings of the PwC Global State of Information Security 2017 Every year a small number of landmark research surveys provide insight and understanding to enable more effective cyber security...

View Article

The Real Challenges Facing Security Operations Teams

With most organizations, the only thing standing between them and a data breach potentially resulting in huge financial losses is the Security Operations (SecOps) team.  Every day they’re charged with...

View Article

Security Consolidation vs. Security Orchestration

The Right Choice Will Make All the Difference A recent survey at the ISACA/RSA conference found that a third of organizations take 6 months or more to fill a cyber security position, and 10% can’t fill...

View Article
Browsing all 28 articles
Browse latest View live