Automation: The Lingua Franca of IT Security

There are two words that can elicit fear from enterprise executives like nothing else: security breach. Yet, despite this, CISOs have all but resigned themselves to knowing those words are likely to come at some point during their tenure. The challeng… Continue reading Automation: The Lingua Franca of IT Security

Trying to write an automated pen testing script with command line tools, is this possible?

Is there a list of command line or scriptable pen test tools that will provide good security? Is there a known list of things that cannot be tested with command line tools? My goal is to write a script that will just run a … Continue reading Trying to write an automated pen testing script with command line tools, is this possible?

Maturing Your Security Operations Center With the Art and Science of Threat Hunting

By combining repeatable processes for threat hunting with intelligent solutions and skilled analysts, organizations can improve threat response and protect their most critical assets.

The post Maturing Your Security Operations Center With the Art and Science of Threat Hunting appeared first on Security Intelligence.

Continue reading Maturing Your Security Operations Center With the Art and Science of Threat Hunting

Adventures in Automating a Candle Factory

Have you ever considered the manufacture of candles? Not necessarily manufacturing them yourself, but how they are manufactured in a small-scale industrial setting? It’s something that has been of great concern to Michael Schuldt as he grappled with the task of automating a simple manual candle production process.

It’s not just an interesting subject, but the topic of manufacturing automation is something we can all learn from. This was the subject of his Adventures in Manufacturing Automation talk at the recent Hackaday Superconference which you’ll find below the break. Let’s dive in and see what this is all about!

How

…read more

Continue reading Adventures in Automating a Candle Factory

NIST releases guidance for risk assessment automation

Security professionals are stretched as thin as you can imagine. Their environments are fragmenting from just their data centers to a multitude of cloud services. Meanwhile, they’re having difficulty finding skilled staff, and their development t… Continue reading NIST releases guidance for risk assessment automation

4 Things SOC Managers Should CARE About in 2019

While most of us make resolutions for personal change in the New Year, meaningful changes in our business lives require a bit more advanced planning. Especially when those changes require budgets, approvals and internal support. As SOC managers and di… Continue reading 4 Things SOC Managers Should CARE About in 2019

A Page-Turner On Kindle – One Step At A Time

You don’t have to be an avid bookworm to find use for an e-book reader. Take your local wedding band for example: with a big repertoire of songs to cover, you don’t really want to drag huge folders full of chords and lyrics around, tediously browsing through them to find the correct one for every new song. Even the biggest tree corpse enthusiast cannot deny the comfort of an e-book reader here. And since turning the page boils down to simply changing the content on a display, you don’t necessarily need to use your hands for that either. With that …read more

Continue reading A Page-Turner On Kindle – One Step At A Time

Top 2019 Cybersecurity Predictions From the Resilient Year-End Webinar

During the recent IBM Resilient year-end webinar, expert panelists discussed and debated the trends that defined 2018 and offered cybersecurity predictions on what the industry can expect in 2019.

The post Top 2019 Cybersecurity Predictions From the Resilient Year-End Webinar appeared first on Security Intelligence.

Continue reading Top 2019 Cybersecurity Predictions From the Resilient Year-End Webinar