Work from home, phase 2: What comes next for security?

Work from home, phase 2: What comes next for security?

Phase 1 was all about employee access, network communications confidentiality/integrity, and basic endpoint security. The next phases will move quickly from risk assessment to mitigation.

3 ways COVID-19 is changing CISO priorities

3 ways COVID-19 is changing CISO priorities

The scramble to enable remote workers changes security strategies, priorities, and workflows for 2020.

Toward a common UI for security operations

Toward a common UI for security operations

New dashboards and visualization tools could improve personnel training, and SOC productivity while streamlining security operations.

RSA 2020: 7 trends and takeaways

RSA 2020: 7 trends and takeaways

Attendance down, costs up, and lots of tech talk

Cybersecurity spending trends, 2020

Cybersecurity spending trends, 2020

Spending is up, but perhaps not in the most needed areas, increased business leader involvement brings new challenges, while vertical industries have different requirements and priorities.

Remembering Chris Christensen

Remembering Chris Christensen

The long-time cybersecurity analyst is gone but not forgotten.

5 ways to cope with the cybersecurity skills shortage (that don't involve hiring)

5 ways to cope with the cybersecurity skills shortage (that don't involve hiring)

Unable to hire their way out of cybersecurity staffing problems, CISOs are turning to process automation, advanced analytics, and third-party services, among other methods.

Moving security operations to the cloud

Moving security operations to the cloud

New ESG research finds organizations are aggressively replacing on-premises security analytics and operations technologies with cloud-based alternatives. The shift comes with both short-term wins and strategic benefits.

5 security operations and analytics trends to watch in 2020

5 security operations and analytics trends to watch in 2020

Look for more integration, an increasing focus on risk management, and greater use of the public cloud.

A common user interface for security operations?

A common user interface for security operations?

Why it's time to change how security analysts visualize, manipulate, interact with, and act upon security telemetry.

4 big changes coming to cybersecurity in 2020 and beyond

4 big changes coming to cybersecurity in 2020 and beyond

The pace of technology and market changes will pick up in 2020, impacting security technologies, innovation, investment, and the industry at large.

3 actions to take during cybersecurity awareness month

3 actions to take during cybersecurity awareness month

Based on recent research, improving cybersecurity awareness among business executives, CIOs, and, yes, infosec professionals should be a goal for any organization.

Cyber-risk management is about to get easier

Cyber-risk management is about to get easier

New continuous automated penetration and attack testing (CAPAT) tools will help CISOs better see where they are vulnerable and prioritize remediation actions.

SOAPA vs. SOAR: How these security terms differ

SOAPA vs. SOAR: How these security terms differ

SOAPA and SOAR are vastly different. Security orchestration, automation, and response (SOAR) tools represent a component of a security operations and analytics platform architecture (SOAPA).

Can VMware become a leading cybersecurity vendor?

Can VMware become a leading cybersecurity vendor?

VMware's recent acquisition of Carbon Black gives the company a strong security foundation to build on.

Examining and addressing threat detection and response challenges

Examining and addressing threat detection and response challenges

Cybersecurity teams are fighting fires and still rely on manual processes. Meanwhile, the attack surface continues to grow. Process improvements are needed.

Black Hat 2019: 3 cybersecurity concerns and 3 things that give hope

Black Hat 2019: 3 cybersecurity concerns and 3 things that give hope

At this year's Black Hat, it was evident that several cybersecurity issues remain a concern, but the industry is making progress.

Looking for answers at Black Hat 2019: 5 important cybersecurity issues

Looking for answers at Black Hat 2019: 5 important cybersecurity issues

As Black Hat 2019 begins, the cybersecurity topics top of mind include network security platforms, threat detection/response services, new cloud security strategies, and clarification around security analytics.

Security analytics: It’s all about the data

Security analytics: It’s all about the data

More security data drives the need for data modeling, data management, and data discipline

Managed security services will take center stage at Black Hat

Managed security services will take center stage at Black Hat

With organizations increasingly needing help detecting and responding to threats, expect managed security services to be one of the main themes at Black Hat 2019.

Load More
Top Blog Posts