How to start achieving visibility in the cloud

As a security executive, you have a curious gig. On one hand, you’re responsible for securing your organization across multiple systems, networks, clouds, and geographies. On the other, your team owns none of those things. Organizing resources in a way… Continue reading How to start achieving visibility in the cloud

Cybersecurity automation? Yes, wherever possible

There was a time when companies were hesitant about their IT and security teams using automation to discharge some of their duties. “I think much of that was due to the feeling that if a task was automated and something went wrong, IT was not in … Continue reading Cybersecurity automation? Yes, wherever possible

What Is Unified Threat Management? A Pragmatic Approach to Information Security

Organizations are spending on security, but threat vectors continue to evolve. Unified threat management tools offer a way to bridge the gap.

The post What Is Unified Threat Management? A Pragmatic Approach to Information Security appeared first on Security Intelligence.

Continue reading What Is Unified Threat Management? A Pragmatic Approach to Information Security

The Art of Patch Management

Reading Time: 4 minutes The vagaries of systems and organizations, compounded by the irrationality of the human mind and variations in patches themselves, means that patch management is not an exact science — it’s an art.

The post The Art of Patch Management appeared first on Security Intelligence.

Continue reading The Art of Patch Management

Office 365 security: Automated incident response based on playbooks

Five months after introducing Automated Incident Response in Office 365 ATP, Microsoft has announced it’s making it more widely available. Customers who have opted for Office 365 ATP Plan 2, Office 365 E5 or Microsoft 365 E5 Security will now be … Continue reading Office 365 security: Automated incident response based on playbooks

DevOps Chat: A CISO’s Quest for Better Security, With Altitude Networks

Michael Coates is on a mission, a journey, an unassailable quest. You don’t come away from senior security leadership roles at Twitter and Mozilla without some real-world lessons of how to improve cybersecurity. Those lessons inspired our guest … Continue reading DevOps Chat: A CISO’s Quest for Better Security, With Altitude Networks

SOC Automation 101: How to Use SOAR to Overcome Time-Consuming Tasks and Address Alerts (Video)

  With the introduction this year of so-called “robot umpires” into professional baseball – as part of an experiment in…
The post SOC Automation 101: How to Use SOAR to Overcome Time-Consuming Tasks and Address Alerts (Video) a… Continue reading SOC Automation 101: How to Use SOAR to Overcome Time-Consuming Tasks and Address Alerts (Video)

Why Is Everyone in Security Talking About Automation?

Everyone in the security world is talking about automation. What began simply as a hot trend in code development is fast becoming the standard in cybersecurity. So, let me tell you why automation is important for today’s security professionals—and wha… Continue reading Why Is Everyone in Security Talking About Automation?

4 Ways to Integrate Cyber Security Automation Within Your Enterprise

A look at top security automation solutions & how they improve operational efficiency and cyber security Businesses of all sizes continually seek ways to increase efficiency and profitability in all…
The post 4 Ways to Integrate Cyber Security A… Continue reading 4 Ways to Integrate Cyber Security Automation Within Your Enterprise