Incident responders increasingly seek out mental health assistance

Incident responders are primarily driven by a strong sense of duty to protect others. This responsibility that’s increasingly challenged by the surge of disruptive attacks, from the proliferation of ransomware attacks to the recent rise of wiper malwar… Continue reading Incident responders increasingly seek out mental health assistance

7 metrics to measure the effectiveness of your security operations

Given inflation and economic uncertainty, the cybersecurity industry is starting to experience budget cuts, despite a surge in ransomware attacks. As more budgets are going under the microscope, and in some cases, on the chopping block, one of the best… Continue reading 7 metrics to measure the effectiveness of your security operations

Majority of SMBs lack 24/7 security operations to detect threats

Cybercriminals and threat actors work around the clock, with attacks originating from around the world. Therefore, all businesses, including SMBs, need to be always on alert for new threats and available to respond at any moment to an incident. This He… Continue reading Majority of SMBs lack 24/7 security operations to detect threats

How SMBs are evolving their cybersecurity operations practices

While 81% of SMBs are monitored by a security operations center (SOC), 57% do not operate 24 hours a day, 7 days a week. Considering that 69% of SMBs feel they are facing critical and expanding cybersecurity threats and 75% say cyberattacks have increa… Continue reading How SMBs are evolving their cybersecurity operations practices

Infosec pros want more industry cooperation and support for open standards

Driven by security operations complexity, 46% of organizations are consolidating or plan on consolidating the number of vendors they do business with. As a result of this drive toward security technology consolidation, 77% of infosec pros would like to… Continue reading Infosec pros want more industry cooperation and support for open standards

How to leverage the power of cyber fusion centers for organizational security

Cyber fusion centers provide advanced security capabilities. Learn how your organization can strengthen its cyberdefense mechanism through a cyber fusion center.
The post How to leverage the power of cyber fusion centers for organizational security app… Continue reading How to leverage the power of cyber fusion centers for organizational security

The future of SOCs: Automation where it matters

Sophisticated attacks, remote work needs and rapidly changing technologies challenge organizations to manage IT security while containing costs and using overburdened staff. Security operations centers (SOCs) increasingly use automation to manage compl… Continue reading The future of SOCs: Automation where it matters

Microsoft helps prevent lateral movement from compromised unmanaged devices

A new feature in Microsoft Defender for Endpoint can make it more difficult for attackers to perform lateral movement within company networks, as it allows admins to prevent traffic flowing to and from unmanaged devices that have been compromised. Isol… Continue reading Microsoft helps prevent lateral movement from compromised unmanaged devices

7 threat detection challenges CISOs face and what they can do about it

Security operations (SecOps) teams continue to be under a constant deluge of new attacks and malware variants. In fact, according to recent research, there were over 170 million new malware variants in 2021 alone. As a result, the burden on CISOs and t… Continue reading 7 threat detection challenges CISOs face and what they can do about it