Are SMBs driving the adoption of security automation by enterprises?

If you tracked the lifecycle of new security technologies, you’d likely see that most start as enterprise solutions and eventually trickle down to small and medium-sized businesses (SMBs). You could probably guess why new security technology flows in t… Continue reading Are SMBs driving the adoption of security automation by enterprises?

A Home Network, Security System, And A Hidden Room Behind A Bookcase

Ok, now this is something special. This is a home network and security system that would make just about anyone stop, and with jaw hanging agape, stare, impressed at the “several months of effort” it took [timekillerjay] to install their dream setup. Just. Wow.

Want a brief rundown of the diverse skill set needed to pull this off? Networking, home security, home automation, woodworking, running two thousand feet(!) of cat 6a cable, a fair hand at drywall work for the dozens upon dozens of patches, painting, staining, and — while not a skill, but is definitely necessary — an amazingly …read more

Continue reading A Home Network, Security System, And A Hidden Room Behind A Bookcase

The importance of threat intelligence and vulnerability remediation prioritization

In this podcast recorded at RSA Conference 2018, Jimmy Graham, Director of Product Management, Vulnerability Management at Qualys, talks about the importance of threat intelligence and vulnerability remediation prioritization. Here’s a transcript of th… Continue reading The importance of threat intelligence and vulnerability remediation prioritization

New Threat Landscape Gives Birth to New Way of Handling Cyber Security

With the growing online availability of attack tools and services, the pool of possible attacks is larger than ever. Let’s face it, getting ready for the next cyber-attack is the new normal! This ‘readiness’ is a new organizational t… Continue reading New Threat Landscape Gives Birth to New Way of Handling Cyber Security

Simpler, Smarter Security With Intelligent Orchestration

IBM’s new Intelligent Orchestration offering enables analysts to streamline their investigations via integrations and incident response playbooks.

The post Simpler, Smarter Security With Intelligent Orchestration appeared first on Security Intelligence.

Continue reading Simpler, Smarter Security With Intelligent Orchestration

Maintaining Your Data Center’s Agility and Making the Most Out of Your Investment in ADC Capacity

Deciding on an appropriate application delivery controller (ADC) and evaluating the need for supporting infrastructure is a complex, complicated, and challenging job. Such challenges result from the fact that ADCs are increasingly used across diverse … Continue reading Maintaining Your Data Center’s Agility and Making the Most Out of Your Investment in ADC Capacity

SOCs require automation to avoid analyst fatigue for emerging threats

A survey conducted by LogicHub at RSA Conference 2018 identified 79 percent of respondents believe both human expertise and security automation is needed for a powerful security infrastructure to keep enterprises safe from breaches. Still, breaches go … Continue reading SOCs require automation to avoid analyst fatigue for emerging threats

Mobile security: Getting to total mobile threat protection

It may come as a surprise to some organizations, but enterprise mobility management (EMM) does not equate to mobile security. Yes, EMM is considered the standard for mobile management, but EMM alone will not keep you or your mobile users and data … Continue reading Mobile security: Getting to total mobile threat protection