In partnership with MITRE Engenuity’s Center for Threat-Informed Defense, AttackIQ launches new automated adversary emulation plan for menuPass

After SolarWinds, organizations need visibility into their security program effectiveness against real world threats. Automated adversary emulations can help meet that need. By generating real data about how your security program performs against menuP… Continue reading In partnership with MITRE Engenuity’s Center for Threat-Informed Defense, AttackIQ launches new automated adversary emulation plan for menuPass

Business email compromise is a top concern for banks

Bottomline and Strategic Treasurer released the results of a survey that gathered details about corporate and banking experiences, actions and plans regarding fraud. Results show that the pandemic accelerated both the threat of fraud and the response t… Continue reading Business email compromise is a top concern for banks

Analysts need advanced automation tools to reduce fear of missing incidents

Security analysts are becoming less productive due to widespread “alert fatigue” resulting in ignored alerts, increased stress, and fear of missing incidents, according to an IDC survey of 350 internal and MSSP security analysts and managers. To improv… Continue reading Analysts need advanced automation tools to reduce fear of missing incidents

Network Security: 5 Fundamentals for 2021

In January 2020, no one could have predicted how unpredictable the coming year would be. But despite the seismic changes to the way we work, the biggest network security threats to organizations were mostly the same old threats we’ve been facing for t… Continue reading Network Security: 5 Fundamentals for 2021

For SOC teams, the analytics and automation hype is real

Tools for analytics and automation are providing today’s SOC teams with enhanced visibility, improved productivity, and unlimited scalability—and it couldn’t come at a better time. In the wake of the COVID-19 pandemic, security has become a top priorit… Continue reading For SOC teams, the analytics and automation hype is real

Protecting productivity within the disappearing perimeter

During the past year, business leaders have seen first-hand the benefits of adopting an everywhere enterprise model of working and are now carefully considering its role in the future of work. A study by Mercer revealed 94% of employers agreed that pro… Continue reading Protecting productivity within the disappearing perimeter

5G experimentation and security grows in govt, military sectors

Spirent Communications released its 5G outlook report, based on analysis and takeaways from over 600 global 5G engagements in 2020. The report provides insights from across the 5G eco-system on the current status of 5G, illustrating the accelerated tim… Continue reading 5G experimentation and security grows in govt, military sectors

When it comes to vulnerability triage, ditch CVSS and prioritize exploitability

When it comes to software security, one of the biggest challenges facing developers today is information overload. Thanks in part to the widespread proliferation and use of open-source code (a study by Red Hat showed that 36% of software in use at surv… Continue reading When it comes to vulnerability triage, ditch CVSS and prioritize exploitability

COVID-19 impact on SecOps: Increased threats, greater investments in automation

Siemplify released a research that studies how the sudden shift to remote work during the COVID-19 pandemic has affected SecOps analysts’ ability to perform their jobs and the impact on overall security postures. The overall cybersecurity posture has r… Continue reading COVID-19 impact on SecOps: Increased threats, greater investments in automation