Reach Security Raises $20M to Help Manage Cybersecurity Products

California startup banks $20 million Series A financing for technology to help businesses manage the maze of security tools and products.
The post Reach Security Raises $20M to Help Manage Cybersecurity Products appeared first on SecurityWeek.
Continue reading Reach Security Raises $20M to Help Manage Cybersecurity Products

It’s time for security operations to ditch Excel

Security teams are hiding an embarrassing secret from the outside world: despite their position at the vanguard of technology, security risks and threats, their actual war plans are managed on spreadsheets. This is a far cry from the dark rooms, multi-… Continue reading It’s time for security operations to ditch Excel

How to Get Started with Security Automation: Consider the Top Use Cases within Your Industry

Organizations in different industries may approach security automation from a different entry point, but the requirements for an automation platform are consistent across use cases.
The post How to Get Started with Security Automation: Consider the To… Continue reading How to Get Started with Security Automation: Consider the Top Use Cases within Your Industry

How security observability can help you fight cyber attacks

Security observability uses the external outputs of a system, its logs, metrics, and traces to infer risk, monitor threats, and alert on breaches. Security professionals use this close observation of system behavior to detect, understand, and stop new … Continue reading How security observability can help you fight cyber attacks

How cyber fusion is helping enterprises modernize security operations

In this Help Net Security video, Anuj Goel, CEO at Cyware, explains how cyber fusion is helping enterprises modernize their security operations and turn their SOC from reactive to proactive.
The post How cyber fusion is helping enterprises modernize se… Continue reading How cyber fusion is helping enterprises modernize security operations

Deception technology and breach anticipation strategies

Cybersecurity is undergoing a paradigm shift. Previously, defenses were built on the assumption of keeping adversaries out; now, strategies are formed with the idea that they might already be within the network. This modern approach has given rise to a… Continue reading Deception technology and breach anticipation strategies

How to avoid shadow AI in your SOC

Samsung’s recent discovery that employees had uploaded sensitive code to ChatGPT should serve as a reminder for security leaders to tread carefully when it comes to integrating new artificial intelligence tools throughout their organizations. Shadow AI… Continue reading How to avoid shadow AI in your SOC

How ChatGPT is changing the cybersecurity game

The cybersecurity industry can leverage GPT-3 potential as a co-pilot to help defeat attackers, according to Sophos. The latest report details projects developed by Sophos X-Ops using GPT-3’s large language models to simplify the search for malic… Continue reading How ChatGPT is changing the cybersecurity game