For Patch Management, Do Like the Bad Guys and Use Automation

Automation engines within unified endpoint management systems can keep up with software patching and offer benefits over typical dedicated patching solutions. For many IT pros, evaluating their company’s exposure to software vulnerabilities and deploy… Continue reading For Patch Management, Do Like the Bad Guys and Use Automation

Red Hat Extends Cybersecurity Automation Ambitions

Red Hat has announced it plans to extend the open source Ansible framework for automating IT operations into the realm of cybersecurity. Announced this month at the AnsibleFest 2018 conference, Red Hat showcased a preview of a declarative approach to … Continue reading Red Hat Extends Cybersecurity Automation Ambitions

Latest Building Security In Maturity Model reflects software security initiatives of 120 firms

Synopsys released BSIMM9, the latest version of the Building Security In Maturity Model (BSIMM) designed to help organizations plan, execute, and measure their software security initiatives (SSIs). The ninth iteration of BSIMM reflects data collected o… Continue reading Latest Building Security In Maturity Model reflects software security initiatives of 120 firms

New tactics subvert traditional security measures and strike organizations of all sizes

Alert Logic released its latest cybersecurity analysis, “Critical Watch Report: The State of Threat Detection 2018,” which shows attackers are gaining vastly greater scale through new techniques such as killchain compression and attack automation, expa… Continue reading New tactics subvert traditional security measures and strike organizations of all sizes

New Part Day: Put An Alexa In Everything

The last great hope for electronics manufactures is smart home assistants. The Alexas and Siris and OK Googles are taking over homes across the country. At its best, it’s HAL 9000, only slightly less homicidal. It will entertain your children, and you can order cat litter just by saying you want cat litter. This is the future, whether we like it or not.

In an attempt to capture the market, Amazon has released the Alexa Connect Kit. This is an Amazon-Echo-On-a-Chip — a piece of hardware that adds Alexa to microwaves, blenders, and whatever other bit of home electronics you …read more

Continue reading New Part Day: Put An Alexa In Everything

Why humans are necessary to the threat hunting process

For thousands of years, humans have worked to collect intelligence on their enemies. Intelligence gathering is not a new practice; in fact, it is one of the oldest war tactics dating back to biblical times, when warlords and army commanders used it to … Continue reading Why humans are necessary to the threat hunting process

Secure Messaging for Enhanced Patient Engagement

With all the advertisements, flashing lights and screens grabbing at us, attention spans are shorter than ever. This is just one of the reasons that everyone is shying away from phone calls, and that messaging has blossomed.
The post Secure Messaging f… Continue reading Secure Messaging for Enhanced Patient Engagement

UIpath lands $225M Series C on $3 billion valuation as robotics process automation soars

UIPath is bringing automation to repetitive processes inside large organizations and it seems to have landed on a huge pain point. Today it announced a massive $225 million Series C on a $3 billion valuation. The round was led by CapitalG and Sequoia Capital. Accel, which invested in the companies A and B rounds also […] Continue reading UIpath lands $225M Series C on $3 billion valuation as robotics process automation soars

How to create a Hall of Fame caliber cybersecurity playbook

Whether the sport is football, basketball or hockey, all the best coaches have playbooks and reports with the latest information on opponents. They study the playing field and never go into a game unprepared, spending hours fine tuning strategies, whet… Continue reading How to create a Hall of Fame caliber cybersecurity playbook