Security Analytics

Analytics and Intelligence

It's Time to Put AI to Work in Security

It’s Time to Put AI to Work in Security

While we’ve been talking about and imagining artificial intelligence for years, it only has recently started to become mainstream, and accepted for a wide range of applications – from healthcare analytics to ...
panasonic nvidia ransomware XDR ransom ProxyLogon Black Kingdom Egregor

Red Flags That Your Environment Is Ripe for a Ransomware Attack

Ransomware doesn’t just happen. Devices and networks are hit with ransomware because there is a failure somewhere in the system. And when the ransomware attack does occur, you’ll know it. By that ...
Security Boulevard
Do You Want Secure Supply Chains? SHOW ME THE MONEY

Do You Want Secure Supply Chains? SHOW ME THE MONEY

The Open Source Security Foundation and Linux Foundation have a plan to fix our broken software supply chains. 1.5M Benjamins needed ...
Security Boulevard
privacy cybersecurity remote

Privacy As Enabling Technology

Recently, Google demonstrated a new smart glasses technology. In the demo, they showed how these smart glasses could “break down communication barriers” by instantaneously translating communications and displaying what the other person ...
Security Boulevard
cybersecurity MSPs

CISA, Int’l Cybersecurity Bodies Issue Advisory to MSPs

The Cybersecurity and Infrastructure Security Agency (CISA), in partnership with four international security organizations including the United Kingdom’s National Cyber Security Centre (NCSC-UK), issued an advisory to help managed service providers (MSPs) ...
Security Boulevard
MAJOR Justice Dept. Breach — ‘Time for Drastic Measures’

MAJOR Justice Dept. Breach — ‘Time for Drastic Measures’

Criminals have access to Justice Department databases and can write fake data, as well as read highly sensitive info, we’re told ...
Security Boulevard
container zero-trust ZTNA

Protecting Container Workloads With a Zero-Trust Strategy

Zero-trust security models are rising in popularity as arguably the most practical and logical approach for securing container environments. Whereas traditional reactive security models focus on maintaining firewalls and enforcing a ‘deny ...
Security Boulevard
EU Has Lost the Plot, Will Ban Encryption — Think of the Children

EU Has Lost the Plot, Will Ban Encryption — Think of the Children

The European Union “is failing to protect children.” Something must be done—and, yes, what they’re proposing is indeed something ...
Security Boulevard
microsegmentation NDR network SASE K8s Network Traffic Analysis Security Goals

Microsegmentation and Zero-Trust Security

Zero-trust security is much more than just a buzzword. It is a critical mindset for organizations to consider as they encounter security challenges related to the growing distributed workforce that is accessing ...
Security Boulevard

How Imperva Data Security Fabric Reduces Splunk Ingestion Costs and Accelerates Incident Management

They say the devil is in the details. This is especially true for security professionals that use Splunk as their organization’s primary security analytics engine. Splunk analytics gives security teams a real-time ...