AI, defense, cybersecurity,

Splunk: Cybercriminals Use These Types of TTPs

A report published by Splunk that analyzed three years of data showed a marked increase in the number of cyberattacks that employ four specific types of techniques. Based on analysis of data ...
Security Boulevard
AI, defense, cybersecurity,

Why We Should Focus on ‘How,’ not ‘Who,’ of Cyberattacks

Organizations often don’t understand what they need to be protecting themselves from when it comes to costly cyberattacks. The threat landscape is becoming ever more evolved and it’s now rare for a ...
Security Boulevard
Figure 1

How ITIL Can Improve Information Security

By: Steven Weil Introduction ITIL - the Information Technology Infrastructure Library - is a set of best practices and guidelines that define an integrated, process-based approach for managing information technology services. ITIL ...

Rewriting the Code

| | policy, procedures, standards
"Can you take a quick look at this please, Rob?"The 'Group' of which our company is the shining star (i.e. highest returns) has been trying to put together what they refer to ...