Five Incident Response Metrics you Should be Recording

Incident response is a critical aspect of any organization's security operations. A properly functioning incident response process ensures quick and efficient resolution of disruptions. To effectively manage incident response in a security ...
IoT Security

5 Top IoT Security Challenges and Solutions

The internet of things (IoT) is growing exponentially, with as many as 25 billion devices expected to be deployed by 2030. IoT technology has many benefits for consumers, corporations and, in particular, ...
Security Boulevard
Limitless bandwidth is not a panacea for mission-critical application QoE

Limitless bandwidth is not a panacea for mission-critical application QoE

Imagine yourself driving on a very broad highway. Lanes are relatively empty and you can cruise along fast and peacefully. Then, suddenly, without warning, you find yourself in a massive traffic jam ...
generative AI security, Microsoft AI cybersecurity

Concentric Adds Intelligence Exchange Service for AI Platform

Concentric Inc. this week launched a service that makes it simpler to translate data and risk insights surfaced by the Semantic Intelligence data access governance platform into specific remediation, monitoring and privacy ...
Security Boulevard

How to improve signal-to-noise ratio to reduce alert fatigue

Alert fatigue and cyber staffing shortfalls continue to challenge security teams, especially as nation-state cyber attacks, which have doubled over three years, keep analysts on constant alert. The Russian attack on Ukraine ...
Hybrid work model is here to stay: how to maintain employee collaboration and productivity?

Hybrid work model is here to stay: how to maintain employee collaboration and productivity?

According to the latest research, the hybrid work model is here to stay. Our working habits are one of many domains that went through a disruptive process during the pandemic. Social distancing ...
monitoring, observability, process monitoring Barracuda Open XDR monitoring DNS threat

How Open XDR Can Prevent Cyberattacks

Analytics seems to be the answer for almost anything, and security is no exception. Most professionals agree that analytics could hold the key to uncovering early actions from attackers with the goal ...
Security Boulevard
LockFile ransomware

LockFile Ransomware Uses Encryption to Avoid Detection

It’s not surprising that ransomware operators were quick to take advantage of the ProxyShell vulnerabilities discovered in Microsoft Exchange servers last April. But a new group, the LockFile ransomware family, has been ...
Security Boulevard
Nurturing a healthy digital transformation process

Nurturing a healthy digital transformation process

Digital Transformation is already a familiar term. In its essence, it deals with the integration of digital technology in all business areas to bring better value to customers. Over the last year, ...