Incident Response

Five Tips for Rapid Communications When an Incident Hits the Water Distribution System

From natural disasters to oil and chemical spills to terrorist attacks to cyberattacks, water distribution systems have to be prepared for a variety of challenges that could contaminate or disrupt the water ...
automation

Automation: Moving from Detection to Enforcement

As organizations rush to embrace automation and the benefits they are expecting to reap, it is crucial to remember that any automation journey should include cybersecurity. Security automation does not start and ...
Security Boulevard
security

DevOps Chat: A CISO’s Quest for Better Security, With Altitude Networks

Michael Coates is on a mission, a journey, an unassailable quest. You don’t come away from senior security leadership roles at Twitter and Mozilla without some real-world lessons of how to improve ...
Security Boulevard

SOC Automation 101: How to Use SOAR to Overcome Time-Consuming Tasks and Address Alerts (Video)

With the introduction this year of so-called “robot umpires” into professional baseball – as part of an experiment in... The post SOC Automation 101: How to Use SOAR to Overcome Time-Consuming Tasks ...
Security Automation

Why Is Everyone in Security Talking About Automation?

Everyone in the security world is talking about automation. What began simply as a hot trend in code development is fast becoming the standard in cybersecurity. So, let me tell you why ...
Security Boulevard
Scaling-Up and Automating Web Application Security

Scaling-Up and Automating Web Application Security

| | app-security, Automation, scale
A few years ago, Netsparker CEO Ferruh Mavituna gave a talk at Infosecurity Europe, a major security conference. He spoke about why organizations need to scale their web security operation and how ...
Certificate Management Checklist

4 Ways to Integrate Cyber Security Automation Within Your Enterprise

A look at top security automation solutions & how they improve operational efficiency and cyber security Businesses of all sizes continually seek ways to increase efficiency and profitability in all... The post ...

IoT Security: It’s Time Enterprises Take Responsibility

As IoT security threats increase, enterprises need to stop blaming the device maker and better secure their networks Companies across industries are quick to say security is their top priority. Executives go ...
Black Hat Recap: Automation is Key to Managing Threats and Scaling the Future of Security (Video)

Black Hat Recap: Automation is Key to Managing Threats and Scaling the Future of Security (Video)

Another Black Hat USA is in the books, and anyone leaving the festivities feeling apprehensive about the state of security... The post Black Hat Recap: Automation is Key to Managing Threats and ...
Automation for NetOps and DevOps

Automation for NetOps and DevOps

Many organizations use public cloud service providers, some in addition to their private cloud and on premise deployments. The right product mix not only reduces vendor lock-in and shadow IT, but is ...
Loading...