Top cybersecurity Substacks to follow

Top cybersecurity Substacks to follow

On Substack, publications run by cybersecurity professionals and journalists with expertise in cybersecurity can help practitioners keep pace with developments in security operations and many other areas of cybersecurity ...
We Love What’s Broken … Yes, This Of Course Means SIEM!

We Love What’s Broken … Yes, This Of Course Means SIEM!

We Love What’s Broken … Yes, This Of Course Means SIEM!SIEM challenges never stopped me from loving this technology, but I am very cognizant of YMMV. Anyhow, CardinalOps released their annual “state of SIEM” ...
Listen up: 10 cybersecurity podcasts you can learn from

Listen up: 10 cybersecurity podcasts you can learn from

Regardless of where you are in your career in cybersecurity –  whether you have been a trusted expert for decades or are just starting out – it can be difficult to keep ...
9 best practices for leveraging threat intelligence in your security operations

9 best practices for leveraging threat intelligence in your security operations

Cyberthreat intelligence (CTI) can be a powerful weapon for protecting an organization from cyberattack, enabling teams to understand both the threats they face and the tactics, techniques, and procedures of their adversaries ...
Security operations by the numbers: 30 cybersecurity stats that matter

Security operations by the numbers: 30 cybersecurity stats that matter

Enterprise IT and security operations (SecOps) leaders are under growing pressure from threat actors pounding away at their infrastructure defenses using a variety of new and proven tactics, techniques and procedures ...
Questions You Need to Ask When Evaluating a Security Automation Vendor

Questions You Need to Ask When Evaluating a Security Automation Vendor

The post Questions You Need to Ask When Evaluating a Security Automation Vendor appeared first on AI Enabled Security Automation ...

Cybersecurity Salary: How Much Can You Earn?

Maybe you’ve heard there’s an interplanetary-sized gap in the amount of cybersecurity professionals available and ...
NSA: State-backed attackers are not after your data — they're targeting CI

NSA: State-backed attackers are not after your data — they’re targeting CI

Companies in the crosshairs of advanced persistent threat (APT) actors look at data theft not as a primary objective of hacking crews backed by Russia, China and Iran — but rather as ...
Why GenAI fails at full SOC automation

Why GenAI fails at full SOC automation

A rapidly growing number of organizations are exploring the use of generative AI tools to transform business processes, improve customer interactions, and enable a variety of new and innovative use cases. But ...
Introducing the Unified RL Spectra Suite

Introducing the Unified RL Spectra Suite

One thing you quickly realize in cybersecurity is that change is a constant. Cyber criminals, nation-state hacking crews, and ideologically motivated hackers are always on the lookout for new technologies, tools, and ...