A cybersecurity risk assessment outlined in a recent government report revealed that the majority of federal agencies struggle to address cyberthreats.
When a dreaded security incident or breach takes place, you'll face your true testing time. Here's how to discover what happened after a security incident — without losing your cool.
When Lincoln Healthcare experiences a watering hole attack, security operations center (SOC) director Malcolm Gerhard is tasked with developing a swift cybersecurity incident response. Will he succeed?
What happens when a malware infection results in permanent loss of data, operational downtime and significant reputational damage? Experience the cyber resilience failures of airline CIO Martin Kinsley.
Step into the shoes of an insurance company CEO chasing digital transformation. Read on as she tries to avoid missteps in this story about modernization, risks, fraud and user experience.
Many security analysts and consultant agree: It's time to get serious about incident response. Explore four critical elements of a solid plan.
Without cognitive insights, a security intelligence platform does little to ease the pressure on short-staffed security operations center (SOC) teams to analyze massive volumes of threat data.
On May 15, over 100 security leaders from across the U.K. and Europe met to talk about the future of cybersecurity and promote collaboration to stay one step ahead of evolving cyberthreats.
Collaborative defense connects an organization's people, processes and technology to deliver improved security through open integrations, threat intelligence sharing and digital transformation.
Designing a security operations center (SOC) is not as simple as setting and forgetting an SIEM solution. Security leaders must consider human factors, business needs, budgetary constraints and more.