KuppingerCole Report: Leadership Compass of Access Management and Federation

IBM Security Access Manager (ISAM) is rated as a leader in the Product, Marketing and Technology Leadership categories in KuppingerCole’s Leadership Compass report on access management and federation.

The post KuppingerCole Report: Leadership Compass of Access Management and Federation appeared first on Security Intelligence.

Continue reading KuppingerCole Report: Leadership Compass of Access Management and Federation

Rewrite the Rules to Reduce Complexity in Your Security Architecture

At RSAC 2019, Sridhar Muppidi and Devin Somppi implored vendors to “start looking at security as a team sport” and redouble their efforts to reduce complexity in their security architecture.

The post Rewrite the Rules to Reduce Complexity in Your Security Architecture appeared first on Security Intelligence.

Continue reading Rewrite the Rules to Reduce Complexity in Your Security Architecture

SOAR: The Second Arm of Security Operations

SIEM tools can help security operations center (SOC) teams detect threats, but what good is threat data without the context analysts need to quickly respond to incidents? That’s where SOAR comes in.

The post SOAR: The Second Arm of Security Operations appeared first on Security Intelligence.

Continue reading SOAR: The Second Arm of Security Operations

Are Applications of AI in Cybersecurity Delivering What They Promised?

Many enterprises are utilizing artificial intelligence (AI) technologies as part of their overall security strategy, but results are mixed on the usefulness of AI in cybersecurity settings.

The post Are Applications of AI in Cybersecurity Delivering What They Promised? appeared first on Security Intelligence.

Continue reading Are Applications of AI in Cybersecurity Delivering What They Promised?

Busting Cybersecurity Silos

To break down cybersecurity silos, professionals must work together to share security information and build collaborative solutions to address the evolving cybersecurity threat landscape.

The post Busting Cybersecurity Silos appeared first on Security Intelligence.

Continue reading Busting Cybersecurity Silos

Collaboration Among Security Vendors Is the Threat Management Solution of the Future

To stay ahead of tomorrow’s cyberthreats, organizations need a threat management solution that consolidates disparate security products into a centralized platform.

The post Collaboration Among Security Vendors Is the Threat Management Solution of the Future appeared first on Security Intelligence.

Continue reading Collaboration Among Security Vendors Is the Threat Management Solution of the Future

How a failed lawsuit trailed Crowdstrike into RSA

Rumors of a failed lawsuit launched by Crowdstrike, a cybersecurity industry leader, against product-testing firm NSS Labs quickly spread Tuesday among the thousands of attendees at the 2017 RSA conference. During one of the conference’s many industry-promoted parties Monday night, multiple attendees could be overheard talking about the controversy even before media reports began circulating. Other […]

The post How a failed lawsuit trailed Crowdstrike into RSA appeared first on Cyberscoop.

Continue reading How a failed lawsuit trailed Crowdstrike into RSA