Enterprises need to embrace top-down cybersecurity management

Enterprises need to embrace top-down cybersecurity management

CISOs must manage cybersecurity based upon their organization’s mission, goals, and business processes, not the technology underpinnings.

02/19/19

IBM sets forth with a strong cybersecurity message

IBM sets forth with a strong cybersecurity message

IBM has a strong cybersecurity message, but there's a gap between IBM security and its corporate vision. If IBM can bridge this gap, it can carve out a unique market position.

02/15/19

Cyber risk management: There's a disconnect between business and security teams

Cyber risk management: There's a disconnect between business and security teams

Business managers want real-time cyber risk management metrics, but cybersecurity teams can only deliver technical data and periodic reports. That gap needs to close.

02/07/19

The problems plaguing security point tools

The problems plaguing security point tools

Security point tools generate too many alerts, create a strain on operational resources, and make security operations complex and time consuming, new ESG research shows.

01/30/19

The cybersecurity skills shortage is getting worse

The cybersecurity skills shortage is getting worse

More than half of organizations report a “problematic shortage” of cybersecurity skills, and there is no end in sight.

01/10/19

2019 will be the year of cloud-based cybersecurity analytics/operations

2019 will be the year of cloud-based cybersecurity analytics/operations

Demand- and supply-side changes will move security information and event management (SIEM) from on premises to the public cloud.

01/04/19

Security operations activities to watch in 2019

Security operations activities to watch in 2019

Open-source software and industry initiatives, such as MITRE ATT&CK framework and Apache Kafka, will contribute to security operations in 2019.

12/19/18

Cyber risk management continues to grow more difficult

Cyber risk management continues to grow more difficult

Primary reasons why cyber risk management is more difficult include increasing workloads, sophisticated threats, and more demanding business executives.

12/06/18

It's time for a new cyber risk management model

It's time for a new cyber risk management model

An overwhelming attack surface, voluminous vulnerabilities, sophisticated threats, and new business requirements demand a new cyber risk management model.

11/28/18

Best-of-breed security products still dominate -- kind of

Best-of-breed security products still dominate -- kind of

CISOs want products that can prevent, detect, and respond to cyber attacks, but they also consider product consolidation and integration.

11/16/18

8 features a cybersecurity technology platform must have

8 features a cybersecurity technology platform must have

Cybersecurity professionals ranked the most important attributes of a cybersecurity technology platform according to strict definitions that meet their requirements.

11/09/18

Cybersecurity professional impressions on cloud-native security

Cybersecurity professional impressions on cloud-native security

Organization use cloud-native security controls, but they really want central management for cloud security across heterogeneous clouds.

10/31/18

6 takeaways from McAfee MPower

6 takeaways from McAfee MPower

The company articulates its device-to-cloud security strategy with vision and series of announcements.

10/26/18

Trend Micro shines a light on its new cybersecurity solutions

Trend Micro shines a light on its new cybersecurity solutions

Trend Micro provides an overview of its new cybersecurity products, platforms, and services.

10/19/18

Splunk lays out its cybersecurity vision

Splunk lays out its cybersecurity vision

At Splunk .Conf 2018, we learned how the company continues to expand its cybersecurity footprint, work with industry partners, and commit to customer success.

10/05/18

Cloudy future for security analytics

Cloudy future for security analytics

Greater data volumes are driving an architectural change, forcing security analytics to the cloud.

10/01/18

Form factor wars: Cloud-based or on-premises security technologies?

Form factor wars: Cloud-based or on-premises security technologies?

While most organizations are willing to consider cloud-based or on-premises security solutions, nearly one-third still demand the control associated with on-premises.

09/26/18

5 biggest cybersecurity challenges at smaller organizations

5 biggest cybersecurity challenges at smaller organizations

Manual processes, security complexity, and a lack of support from business management plague small and midsize businesses (SMBs).

09/19/18

CISOs recommend future actions for their organizations

CISOs recommend future actions for their organizations

More security goals for the business, formal security processes, and increased training top the list of recommendations from chief information security officers.

09/05/18

The most important attributes of a cybersecurity platform

The most important attributes of a cybersecurity platform

A cybersecurity platform should have coverage across major threat vectors, central management, and technologies for prevention, detection, and response in any security platform.

08/29/18

Load More