Only 43% of security pros can respond to critical alerts in less than an hour

Deepwatch released the State of the Modern SOC report, which found that most IT security professionals believe they could have stopped business impacting cyber events if equipped with better response capabilities. Many seek more automation and less ale… Continue reading Only 43% of security pros can respond to critical alerts in less than an hour

5 critical questions to test your ransomware preparedness

I’m a pentester – that is, a professional penetration tester. Some call me an ethical hacker, a white hat, or red teamer. In the heat of the moment, I’ve been called much worse – because I’ve spent countless hours attacking organizations like yours wit… Continue reading 5 critical questions to test your ransomware preparedness

Why EDR is not sufficient to protect your organization

Endpoint detection and response (EDR) tools are a cornerstone of most cybersecurity defenses today. But while the technology has an important role to play in investigating threats, too many organizations have made the mistake of relying on EDR as their… Continue reading Why EDR is not sufficient to protect your organization

Why a modern vulnerability management strategy requires state-of-the-art solutions

In this interview with Help Net Security, Stephen Carter, CEO at Nucleus Security, explains the importance of having a vulnerability management strategy within an organization, what are the biggest challenges and what should be done to overcome them. V… Continue reading Why a modern vulnerability management strategy requires state-of-the-art solutions

What is Ransomware Protection as a Service?

Ransomware attacks have devastating consequences for many businesses. Those go beyond the monetary loss tied to ransom-encrypted data, and include disrupted operations, unhappy customers, regulatory fines, and—worst of all—reputational damage that can … Continue reading What is Ransomware Protection as a Service?

To shift to data-driven security decision making: Start with the right data

We live in the age of data-driven everything. From sales to operations, and everything in-between, today’s organizations are constantly looking for ways to leverage the data they accrue – reacting more agilely, operating more efficiently, and saf… Continue reading To shift to data-driven security decision making: Start with the right data

AI and ML implementation in cybersecurity programs pushes for a change in people’s mindset

In this interview with Help Net Security, Scott Laliberte, Managing Director at Protiviti, talks about the implementation of AI and ML in cybersecurity programs, why this is a good practice and how it can advance cybersecurity overall. AI and ML have b… Continue reading AI and ML implementation in cybersecurity programs pushes for a change in people’s mindset