Gartner Releases 2019 Market Guide for SOAR Solutions

Reading Time: 3 minutes In its new market guide for security orchestration and automation, Gartner predicted, “By year-end 2022, 30% of organizations with a security team larger than five people will leverage SOAR tools.”

The post Gartner Releases 2019 Market Guide for SOAR Solutions appeared first on Security Intelligence.

Continue reading Gartner Releases 2019 Market Guide for SOAR Solutions

Take a Proactive Approach to the Darknet Threat

A proactive approach to security and intelligence gathering is the best way to stem the tide of threats and lucrative trading of business-critical data on the darknet.

The post Take a Proactive Approach to the Darknet Threat appeared first on Security Intelligence.

Continue reading Take a Proactive Approach to the Darknet Threat

Everything Is Best When It Comes to Cybersecurity Best Practices

How can security professionals keep up with cybersecurity best practices without taking too much time away from other responsibilities?

The post Everything Is Best When It Comes to Cybersecurity Best Practices appeared first on Security Intelligence.

Continue reading Everything Is Best When It Comes to Cybersecurity Best Practices

Why You Need a Healthy Mix of Security Analytics to Investigate Threats

Effective threat management requires security teams to combine various sources of security analytics with machine-generated data to investigate incidents with speed and accuracy.

The post Why You Need a Healthy Mix of Security Analytics to Investigate Threats appeared first on Security Intelligence.

Continue reading Why You Need a Healthy Mix of Security Analytics to Investigate Threats

How IBM X-Force IRIS Prepared for the Ukraine Election

More than a month before the first round of the Ukraine election in March, we decided that we couldn’t afford to sit on our heels until an attack was launched.

The post How IBM X-Force IRIS Prepared for the Ukraine Election appeared first on Security Intelligence.

Continue reading How IBM X-Force IRIS Prepared for the Ukraine Election

Level Up Security Operations With Threat Intelligence Cheat Codes

Like the video game industry, security has shifted toward unified platforms, and contextual threat intelligence is the cheat code SOC teams need to defeat the bosses standing in the way of security.

The post Level Up Security Operations With Threat Intelligence Cheat Codes appeared first on Security Intelligence.

Continue reading Level Up Security Operations With Threat Intelligence Cheat Codes

Automation in Cyber Resilient Organizations: Key Findings From 2019 Ponemon Study

A recent Ponemon study revealed a set of habits and practices that the most cyber resilient organizations undertake, such as adopting automation for tasks that don’t require human oversight.

The post Automation in Cyber Resilient Organizations: Key Findings From 2019 Ponemon Study appeared first on Security Intelligence.

Continue reading Automation in Cyber Resilient Organizations: Key Findings From 2019 Ponemon Study

KuppingerCole Report: Leadership Compass of Access Management and Federation

IBM Security Access Manager (ISAM) is rated as a leader in the Product, Marketing and Technology Leadership categories in KuppingerCole’s Leadership Compass report on access management and federation.

The post KuppingerCole Report: Leadership Compass of Access Management and Federation appeared first on Security Intelligence.

Continue reading KuppingerCole Report: Leadership Compass of Access Management and Federation

What Is the Role of SIEM in the Fusion Center Era?

A fusion center uses a wider set of data sources, collects data from both inside and outside the organization, and delivers it to the right people to help them respond and recover more efficiently.

The post What Is the Role of SIEM in the Fusion Center Era? appeared first on Security Intelligence.

Continue reading What Is the Role of SIEM in the Fusion Center Era?

Foster a Culture of Knowledge Sharing in Your Security Operations Center

To bridge the skills gap, increase efficiency and lighten the load of overwhelmed analysts, it’s imperative to encourage knowledge sharing among your security operations center team.

The post Foster a Culture of Knowledge Sharing in Your Security Operations Center appeared first on Security Intelligence.

Continue reading Foster a Culture of Knowledge Sharing in Your Security Operations Center