Stop Trying to Take Humans Out of SOC … Except … Wait… Wait… Wait…

Stop Trying to Take Humans Out of SOC … Except … Wait… Wait… Wait…

Stop Trying to Take Humans Out of SOC … Except … Wait… Wait… Wait…This is about the Security Operations Center (SOC). And automation. And of course SOC automation.Let’s start from a dead-obvious point: you cannot ...

Are your Cyber Tools Killing your Cyber Program?

In an effort to mature their cyber security and be more ‘secure’ many organization simply add more tools to their stack to give them a false sense that more data is stronger ...
Application Delivery Challenges for DevOps

Application Delivery Challenges for DevOps

| | Application Delivery, DEVOPS, NetOps, secops
Application development now requires NetOps and SecOps to work together, thereby putting increased stress on developers and engineers. The post Application Delivery Challenges for DevOps appeared first on Radware Blog ...
Application Delivery Use Cases for Cloud and On-Premise Applications

Application Delivery Use Cases for Cloud and On-Premise Applications

Most of us use web applications in our daily lives, whether at work or for personal reasons. These applications include sites offering banking and financial services, payroll, utilities, online training, just to ...
Adaptive Shield

DevOps and SecOps: Resolving the Rift Between Development and Security

Helping DevOps and SecOps teams work together in harmony for better security Developing a new application or services can be an exciting, energizing task for a business. We get caught up in ...
Security Boulevard
Gábor Szappanos - The Nigerians are in the Spajz

How to Run Effective Security Awareness Training for your Organisation

| | Phishing, secops, security, technology
Ever wondered how you can deliver security awareness training to staff in your organisation that they will love? In this article, we are revealing the techniques we find useful in our training ...
The Need for Real-World Runtime Protection Benchmarking

The Need for Real-World Runtime Protection Benchmarking

First-principles thinking is one of the best ways to reverse-engineer complicated problems and unleash creative possibility. Sometimes called “reasoning from first principles,” the idea is to break down complicated problems into basic ...
Why DevOps Needs Security During an Infrastructure Transition

Why DevOps Needs Security During an Infrastructure Transition

The rising popularity of DevOps practices in cloud infrastructure environments has allowed software teams to release work more quickly and efficiently than ever before, but is security top of mind? Data included ...
Three Homegrown SecOps Tools Used by the Threat Stack Team

Three Homegrown SecOps Tools Used by the Threat Stack Team

As a security company, there’s a lot of pressure to keep our data secure while still moving fast and innovating on product development. I find the intersection of security and speed the ...
Connected feedback loops in Application Security — Understand offense to inform defense

Connected feedback loops in Application Security — Understand offense to inform defense

I recently read this fascinating post by Jeremiah Grossman titled “All these vulnerabilities, rarely matter”. I’d highly encourage everyone to read it.There has been a rampant adoption and agreement that security awareness ...