
XDR is coming: 5 steps CISOs should take today
Beyond threat detection and response, CISOs should think of XDR as an opportunity to modernize the SOC, automating processes, and improving staff productivity. Here's your XDR game plan for 2021.

The most important cybersecurity topics for business executives
Data privacy, current cyberthreats, and cybersecurity culture and training top the list, but are these the right priorities?

4 ways security has failed to become a boardroom issue
New research finds that despite being more engaged with cybersecurity, business executives and board members continue to view cybersecurity as a technology domain rather than a business concern.

Why 2021 will be a big year for deception technology
New use cases, MITRE Shield support, and greater awareness will drive market growth and penetration.

Is Cybersecurity Awareness Month worth it?
Cybersecurity awareness month has never gained traction beyond academia and the public sector. It’s time for all parties to commit or quit.

5 persistent challenges security pros face
Highlights from the fourth annual “Life and Times of Cybersecurity Professionals” report

The cybersecurity skills shortage is getting worse
New research from ESG and ISSA illustrates a lack of advancement in bridging the cybersecurity skill shortage gap.

Bracing for the security data explosion
Organizations must prepare for collecting, processing, analyzing, and acting upon terabytes of security data.

3 XDR market challenges
XDR is a promising concept, but XDR vendors face deployment challenges and competition on several fronts.

10 security changes post-COVID-19
CISOs must anticipate burgeoning needs for distributed security scale, intelligence, and self-service.

10 things you should know about XDR
An initiative more than a technology, XDR seeks to simplify and unify security technologies to make the whole greater than the sum of its parts.

4 tips for a successful cyber threat intelligence program
COVID-19 has opened the cyberattack floodgates; defenders need strong cyber threat intelligence (CTI) analysis, operationalization and sharing. Here's how to get more from your CTI program.

Work from home, phase 2: What comes next for security?
Phase 1 was all about employee access, network communications confidentiality/integrity, and basic endpoint security. The next phases will move quickly from risk assessment to mitigation.

3 ways COVID-19 is changing CISO priorities
The scramble to enable remote workers changes security strategies, priorities, and workflows for 2020.

Toward a common UI for security operations
New dashboards and visualization tools could improve personnel training, and SOC productivity while streamlining security operations.

Cybersecurity spending trends, 2020
Spending is up, but perhaps not in the most needed areas, increased business leader involvement brings new challenges, while vertical industries have different requirements and priorities.


5 ways to cope with the cybersecurity skills shortage (that don't involve hiring)
Unable to hire their way out of cybersecurity staffing problems, CISOs are turning to process automation, advanced analytics, and third-party services, among other methods.

Moving security operations to the cloud
New ESG research finds organizations are aggressively replacing on-premises security analytics and operations technologies with cloud-based alternatives. The shift comes with both short-term wins and strategic benefits.
-
White Paper
-
Sponsor Article
Sponsored -
Video/Webcast
Sponsored -
White Paper
-
White Paper