Endpoint security is consolidating, but what does that mean?

Endpoint security is consolidating, but what does that mean?

Organizations seeking tightly-integrated endpoint security solutions must determine how far they want to go.

04/11/2019

The case for continuous automated security validation

The case for continuous automated security validation

Organizations must truly understand their vulnerabilities at all times to make the right risk mitigation decisions. Continuous automated security validation can provide that.

04/05/2019

OpenC2 can accelerate security operations, automation, and orchestration

OpenC2 can accelerate security operations, automation, and orchestration

OpenC2, a standards effort from OASIS, has the potential to accelerate and automate risk mitigation and incident response. Users and vendors should jump onboard.

04/02/2019

Vulnerability management woes continue, but there is hope

Vulnerability management woes continue, but there is hope

Prioritizing fixes, workflows, and timely patching are just some of the challenges organizations face, but advanced data analytics may help with vulnerability management.

03/28/2019

The cybersecurity technology consolidation conundrum

The cybersecurity technology consolidation conundrum

As point tools come together as platforms and solutions, cybersecurity professionals need to think outside the box about procurement, implementation, and operations.

03/26/2019

Cyber risk management challenges are impacting the business

Cyber risk management challenges are impacting the business

Organizations struggle with continuous monitoring, tracking the threat landscape, identifying sensitive data flows, and communication between cybersecurity and business executives.

03/19/2019

The buzz at RSA 2019: Cloud security, network security, managed services and more

The buzz at RSA 2019: Cloud security, network security, managed services and more

The buzz at RSA 2019 included talk about cybersecurity and business leaders coming together, managed services, cloud security, network security and more.

03/11/2019

What to expect at the RSA Conference 2019

What to expect at the RSA Conference 2019

The RSA Conference will feature cloud-scale security analytics, endpoint security suites, API security, advanced security services, and a traffic jam of people.

02/26/2019

Enterprises need to embrace top-down cybersecurity management

Enterprises need to embrace top-down cybersecurity management

CISOs must manage cybersecurity based upon their organization’s mission, goals, and business processes, not the technology underpinnings.

02/19/2019

IBM sets forth with a strong cybersecurity message

IBM sets forth with a strong cybersecurity message

IBM has a strong cybersecurity message, but there's a gap between IBM security and its corporate vision. If IBM can bridge this gap, it can carve out a unique market position.

02/15/2019

Cyber risk management: There's a disconnect between business and security teams

Cyber risk management: There's a disconnect between business and security teams

Business managers want real-time cyber risk management metrics, but cybersecurity teams can only deliver technical data and periodic reports. That gap needs to close.

02/07/2019

The problems plaguing security point tools

The problems plaguing security point tools

Security point tools generate too many alerts, create a strain on operational resources, and make security operations complex and time consuming, new ESG research shows.

01/30/2019

The cybersecurity skills shortage is getting worse

The cybersecurity skills shortage is getting worse

More than half of organizations report a “problematic shortage” of cybersecurity skills, and there is no end in sight.

01/10/2019

2019 will be the year of cloud-based cybersecurity analytics/operations

2019 will be the year of cloud-based cybersecurity analytics/operations

Demand- and supply-side changes will move security information and event management (SIEM) from on premises to the public cloud.

01/04/2019

Security operations activities to watch in 2019

Security operations activities to watch in 2019

Open-source software and industry initiatives, such as MITRE ATT&CK framework and Apache Kafka, will contribute to security operations in 2019.

12/19/2018

Cyber risk management continues to grow more difficult

Cyber risk management continues to grow more difficult

Primary reasons why cyber risk management is more difficult include increasing workloads, sophisticated threats, and more demanding business executives.

12/06/2018

It's time for a new cyber risk management model

It's time for a new cyber risk management model

An overwhelming attack surface, voluminous vulnerabilities, sophisticated threats, and new business requirements demand a new cyber risk management model.

11/28/2018

Best-of-breed security products still dominate -- kind of

Best-of-breed security products still dominate -- kind of

CISOs want products that can prevent, detect, and respond to cyber attacks, but they also consider product consolidation and integration.

11/16/2018

8 features a cybersecurity technology platform must have

8 features a cybersecurity technology platform must have

Cybersecurity professionals ranked the most important attributes of a cybersecurity technology platform according to strict definitions that meet their requirements.

11/09/2018

Cybersecurity professional impressions on cloud-native security

Cybersecurity professional impressions on cloud-native security

Organization use cloud-native security controls, but they really want central management for cloud security across heterogeneous clouds.

10/31/2018

Load More