604 Results for:SOC

  • Sort by: 

How has container security changed since 2020, and have we taken it too far?

By Rob Tyler 28 Oct 2022

While containers are now one of the most popular ways to deploy applications, it is fair to say that the adoption and implementation of security best practice to govern their use has not kept up Read More

Advance your security operations center with AI

By Sharon Shea 15 May 2020

Powering a security operations center with AI systems not only automates tasks, but also complements admins' efforts to more effectively combat threats and transform processes. Read More

Security's Buoyancy Aid - Keeping Your Head Above Murky Cyber Waters With Swimlane

By Steve Broadhead 07 Feb 2022

Towards the end of last year, I spoke about a vendor, Swimlane, who appeared to be getting the concept of automation and orchestration absolutely on the money – and in the area where it is most ... Read More

Considerations when deciding on a new SIEM or SOAR tool

By Cliff Saran 23 Aug 2021

A successful deployment of any security tool very much depends on the maturity of security processes in the organisation Read More

How to maintain security with an understaffed security team

By Sharon Shea 29 Nov 2022

Unsurprisingly, many companies function without a complete security team. Security tasks often fall to others in the organization. Here's some advice for stand-in security members. Read More

Saudi Arabian organisations choose to outsource to improve cyber security posture

By Pat Brans 06 Sep 2022

Overwhelmed by rising threats and a growing number of government mandates, many organisations in Saudi Arabia are looking for outside help to take care of cyber security Read More

Moreno Valley school system shores up ransomware defenses

By Arielle Waldman 14 Nov 2022

Moreno Valley Unified School District officials discuss the steps they've taken to better protect sensitive data and critical applications against the growing threat of ransomware. Read More

Zoom adds new round of cyber security enhancements

By Alex Scroxton 21 Apr 2022

Videoconferencing platform Zoom adds multiple third-party security certifications and service enhancements Read More

Real-world hyperautomation examples show AI's business value

By John Burke 24 Jun 2022

Hyperautomation examples in the real world help businesses automate as many of their processes as possible and achieve their strategic goals. AI is instrumental in these efforts. Read More

The nature of the CISO role will be in flux in 2023

By Alex Scroxton 13 Dec 2022

As cyber risk outpaces organisational defences, and cyber attacks and breaches cause more and more damage, the nature of the CISO role is entering a state of flux, according to a report Read More