analytics
Five Incident Response Metrics you Should be Recording
Incident response is a critical aspect of any organization's security operations. A properly functioning incident response process ensures quick and efficient resolution of disruptions. To effectively manage incident response in a security ...
Five Incident Response Metrics you Should be Recording
Incident response is a critical aspect of any organization's security operations. A properly functioning incident response process ensures quick and efficient resolution of disruptions. To effectively manage incident response in a security ...

5 Top IoT Security Challenges and Solutions
The internet of things (IoT) is growing exponentially, with as many as 25 billion devices expected to be deployed by 2030. IoT technology has many benefits for consumers, corporations and, in particular, ...

Limitless bandwidth is not a panacea for mission-critical application QoE
Imagine yourself driving on a very broad highway. Lanes are relatively empty and you can cruise along fast and peacefully. Then, suddenly, without warning, you find yourself in a massive traffic jam ...

Concentric Adds Intelligence Exchange Service for AI Platform
Concentric Inc. this week launched a service that makes it simpler to translate data and risk insights surfaced by the Semantic Intelligence data access governance platform into specific remediation, monitoring and privacy ...
How to improve signal-to-noise ratio to reduce alert fatigue
Alert fatigue and cyber staffing shortfalls continue to challenge security teams, especially as nation-state cyber attacks, which have doubled over three years, keep analysts on constant alert. The Russian attack on Ukraine ...

The power of real-time capabilities for communication service providers
A colleague of mine recently alerted me to a white paper she read about the competitive advantage of real-time. The concept of “real-time” remains a hot topic, and I can appreciate the ...

Hybrid work model is here to stay: how to maintain employee collaboration and productivity?
According to the latest research, the hybrid work model is here to stay. Our working habits are one of many domains that went through a disruptive process during the pandemic. Social distancing ...

How Open XDR Can Prevent Cyberattacks
Analytics seems to be the answer for almost anything, and security is no exception. Most professionals agree that analytics could hold the key to uncovering early actions from attackers with the goal ...

LockFile Ransomware Uses Encryption to Avoid Detection
It’s not surprising that ransomware operators were quick to take advantage of the ProxyShell vulnerabilities discovered in Microsoft Exchange servers last April. But a new group, the LockFile ransomware family, has been ...