Using Deception and Automation to Reduce Attacker Dwell Time

In the treatise, “The Prince,” Niccolo Machiavelli, a 16th-century political theorist, muses about using deception to gain advantage over political…
The post Using Deception and Automation to Reduce Attacker Dwell Time appeared first on S… Continue reading Using Deception and Automation to Reduce Attacker Dwell Time

Understanding the Power of SOAR for Government

How SOAR in government can help build a comprehensive and cohesive strategy for agencies By now, it’s clear that the shifting cyberattack landscape requires new approaches and tools on the part of the federal government. Agencies must “see,” with a si… Continue reading Understanding the Power of SOAR for Government

Autodrop3D Continues Working At 3D Printer Automation

It is an unfortunate fact that 3D printers spend most of their time sitting idle, waiting for a human to remove finished prints or waiting for the next print to start. Hackers see such inefficiency as an open invitation to devise a better way, and we’ve seen several innovative ideas …read more

Continue reading Autodrop3D Continues Working At 3D Printer Automation

Do mail servers follow links in emails as part of a security scan before inbox delivery?

I’ve implemented a passwordless login using a magic link and email. The link can be used only once. One customer is complaining that once they click the link, the page reports that the link is already used. This is indeed wha… Continue reading Do mail servers follow links in emails as part of a security scan before inbox delivery?

Siemens LOGO!, a PLC for small automation projects, open to attack

LOGO!, a programmable logic controller (PLC) manufactured by Siemens, sports three vulnerabilities that could allow remote attackers to reconfigure the device, access project files, decrypt files, and access passwords. About LOGO! LOGO! is an intellige… Continue reading Siemens LOGO!, a PLC for small automation projects, open to attack

Automate the Freight: Amazon’s Robotic Packaging Lines

In the “Automate the Freight” series, I’ve concentrated on stories that reflect my premise that the killer app for self-driving vehicles will not be private passenger cars, but will more likely be the mundane but necessary task of toting things from place to place. The economics of replacing thousands of …read more

Continue reading Automate the Freight: Amazon’s Robotic Packaging Lines

Network automation market expected to grow to $16.9 billion by 2022

According to market research by MarketsandMarkets, the network automation market size is expected to grow from $2.3 billion in 2017 to $16.9 billion by 2022, at a Compound Annual Growth Rate (CAGR) of 48.7% during the forecast period. Major drivers of … Continue reading Network automation market expected to grow to $16.9 billion by 2022

How to Break Broken SOC Cycles

We’ve all heard the same buzzwords used to describe the current situation in security operation centers (SOCs). Among them are “alert fatigue,” “labor crunch,” the “skills gap,” “high turnover” and “missing advanced threats.” Based on my experience wo… Continue reading How to Break Broken SOC Cycles

Five ways automating IAM saves you money

Identity is the foundation of security, so a robust automated identity and access management (IAM) system is by far the best way to keep your company’s information safe. It’s also a great way to increase efficiency and save money. It’s no wonder so man… Continue reading Five ways automating IAM saves you money

Engineering teams are struggling because they’re missing the right automation

Driven by the trend of microservices creating complexity in code delivery and every company becoming a technology company, the software development community is under enormous pressure to deliver high-quality, leading-edge, and scalable code to an insa… Continue reading Engineering teams are struggling because they’re missing the right automation