Key factors for effective security automation

Harnessing the potential of automation in cybersecurity is key to maintaining a robust defense against ever-evolving threats. Still, this approach comes with its own unique challenges. In this Help Net Security interview, Oliver Rochford, Chief Futuris… Continue reading Key factors for effective security automation

Companies encounter months-long delays in filling critical security positions

A lack of executive understanding and an ever-widening talent gap that is placing an unsustainable burden on security teams to prevent business-ending breaches, according to Swimlane. The research investigated the perceptions of cybersecurity among on-… Continue reading Companies encounter months-long delays in filling critical security positions

StayrAI performs automatic water-changes so aquarists don’t have to

Regular water-changes are essential to the wellbeing of aquarium fish, but the task sometimes gets missed, plus it can be difficult to determine how much water should be replaced, and how often. That’s where the automated StayrAI Rein system comes in.C… Continue reading StayrAI performs automatic water-changes so aquarists don’t have to

SIEM and SOAR in 2023: Key trends and new changes

Security information and event management (SIEM) systems remain a key component of security operations centers (SOCs). Security orchestration, automation, and response (SOAR) frameworks, meanwhile, have emerged to fill the gap in these capabilities left by many SIEM systems. But as many companies have begun reaching the limits of SIEM and SOAR systems over the last […]

The post SIEM and SOAR in 2023: Key trends and new changes appeared first on Security Intelligence.

Continue reading SIEM and SOAR in 2023: Key trends and new changes

Businesses count the cost of network downtime

Fewer than one in ten CIOs can claim that they have avoided a network outage, according to Opengear. This finding is among new research by Opengear of both CIOs and network engineers globally. The scale and frequency of network outages is revealed by 9… Continue reading Businesses count the cost of network downtime

DevSecOps: Striking a Balance Between Speed and Security

The current fast-paced business environment demands quick delivery of new products and services, often at the expense of security. To address this, DevSecOps has emerged as a security-focused approach to software development that reconciles the trade-off between speed and security. DevSecOps ensures that security is not an afterthought but a crucial aspect integrated into every […]

The post DevSecOps: Striking a Balance Between Speed and Security appeared first on Security Intelligence.

Continue reading DevSecOps: Striking a Balance Between Speed and Security

US and European IT decision-makers have different cloud security priorities

The growing adoption of cloud has elevated cloud security fear for IT teams, as they grapple with the challenges and concerns arising from the widespread use of complex cloud environments while diligently addressing them, according to SUSE. Cloud secur… Continue reading US and European IT decision-makers have different cloud security priorities