Risk Management January 14, 2019 When It Comes to Cyber Risks, A Confident Board Isn’t Always a Good Thing 4 min read - While board directors have been concerned with cybersecurity for some time, we're now seeing reports that they are improving their understanding of cyber risks and how those risks can impact business.
Threat Hunting January 11, 2019 Maturing Your Security Operations Center With the Art and Science of Threat Hunting 5 min read - By combining repeatable processes for threat hunting with intelligent solutions and skilled analysts, organizations can improve threat response and protect their most critical assets.
January 7, 2019 HHS Publishes Voluntary Healthcare Cybersecurity Practices for Medical Organizations 2 min read - The U.S. Department of Health and Human Services (HHS) released voluntary healthcare cybersecurity practices to help medical organizations strengthen their security posture.
CISO January 4, 2019 Your Security Strategy Is Only as Strong as Your Cyber Hygiene 3 min read - Without full network visibility and regular utilization of cyber hygiene best practices, your enterprise could face very real, but entirely preventable, security risks.
Incident Response January 2, 2019 Top 2019 Cybersecurity Predictions From the Resilient Year-End Webinar 3 min read - During the recent IBM Resilient year-end webinar, expert panelists discussed and debated the trends that defined 2018 and offered cybersecurity predictions on what the industry can expect in 2019.
Cloud Security December 19, 2018 Enterprise Security: Cloud-y With a Chance of Data Breaches 3 min read - Companies should look for a cloud security solution that sits in front of the database and can send traffic to your existing tools without having to install any software on the database.
Artificial Intelligence December 18, 2018 Machine Learning Will Transform How We Detect Software Vulnerabilities 3 min read - When used as part of the software development process, machine learning can help identify vulnerabilities before threat actors have a chance to exploit them.
Endpoint December 14, 2018 Stay on Top of Zero-Day Malware Attacks With Smart Mobile Threat Defense 2 min read - Mobile threats are growing both in number and severity. To protect crucial data, organizations need mobile threat defense solutions that can replicate the accuracy of manual analysis on a large scale.
Artificial Intelligence December 6, 2018 Machine Learning Algorithms Are Not One-Size-Fits-All 7 min read - Before you can choose the right machine learning algorithms to serve your business' needs, you must understand the type of problem you're trying to solve and the type of training data you'll need.
Government December 5, 2018 How Can Government Security Teams Overcome Obstacles in IT Automation Deployment? 4 min read - IT automation is the future of security programs, but it's not simply plug-and-play. SOC leaders must implement this technology thoughtfully to unlock the full range of benefits.