security operations

Shuffle Automation: Open-source security automation platform

Shuffle Automation: Open-source security automation platform 2024-07-22 at 07:01 By Mirko Zorz Shuffle is an open-source automation platform designed by and for security professionals. While security operations are inherently complex, Shuffle simplifies the process. It’s designed to integrate with Managed Security Service Providers (MSSPs) and other service providers. Key features Feature-rich workflow editor. App creator […]

React to this headline:

Loading spinner

Shuffle Automation: Open-source security automation platform Read More »

Leveraging AI and automation for enhanced security operations

Leveraging AI and automation for enhanced security operations 2024-06-28 at 07:01 By Mirko Zorz In this Help Net Security interview, Michelle Weston, VP of Security & Resiliency at Kyndryl, discusses the key challenges in security operations and how to address them. The top issues are increasing cyber resilience risks, changing regulatory conditions, and implementing emerging

React to this headline:

Loading spinner

Leveraging AI and automation for enhanced security operations Read More »

Reach Security Raises $20M to Help Manage Cybersecurity Products

Reach Security Raises $20M to Help Manage Cybersecurity Products 2024-03-08 at 16:59 By Ryan Naraine California startup banks $20 million Series A financing for technology to help businesses manage the maze of security tools and products. The post Reach Security Raises $20M to Help Manage Cybersecurity Products appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Reach Security Raises $20M to Help Manage Cybersecurity Products Read More »

It’s time for security operations to ditch Excel

It’s time for security operations to ditch Excel 2024-02-26 at 07:33 By Help Net Security Security teams are hiding an embarrassing secret from the outside world: despite their position at the vanguard of technology, security risks and threats, their actual war plans are managed on spreadsheets. This is a far cry from the dark rooms,

React to this headline:

Loading spinner

It’s time for security operations to ditch Excel Read More »

How to Get Started with Security Automation: Consider the Top Use Cases within Your Industry

How to Get Started with Security Automation: Consider the Top Use Cases within Your Industry 2024-01-08 at 15:46 By Marc Solomon Organizations in different industries may approach security automation from a different entry point, but the requirements for an automation platform are consistent across use cases. The post How to Get Started with Security Automation:

React to this headline:

Loading spinner

How to Get Started with Security Automation: Consider the Top Use Cases within Your Industry Read More »

How security observability can help you fight cyber attacks

How security observability can help you fight cyber attacks 31/10/2023 at 08:31 By Help Net Security Security observability uses the external outputs of a system, its logs, metrics, and traces to infer risk, monitor threats, and alert on breaches. Security professionals use this close observation of system behavior to detect, understand, and stop new and

React to this headline:

Loading spinner

How security observability can help you fight cyber attacks Read More »

How cyber fusion is helping enterprises modernize security operations

How cyber fusion is helping enterprises modernize security operations 11/10/2023 at 07:02 By Help Net Security In this Help Net Security video, Anuj Goel, CEO at Cyware, explains how cyber fusion is helping enterprises modernize their security operations and turn their SOC from reactive to proactive. The post How cyber fusion is helping enterprises modernize

React to this headline:

Loading spinner

How cyber fusion is helping enterprises modernize security operations Read More »

Deception technology and breach anticipation strategies

Deception technology and breach anticipation strategies 14/08/2023 at 08:02 By Mirko Zorz Cybersecurity is undergoing a paradigm shift. Previously, defenses were built on the assumption of keeping adversaries out; now, strategies are formed with the idea that they might already be within the network. This modern approach has given rise to advanced methods prioritizing rapid

React to this headline:

Loading spinner

Deception technology and breach anticipation strategies Read More »

What if the Current AI Hype Is a Dead End?

What if the Current AI Hype Is a Dead End? 05/06/2023 at 18:27 By Oliver Rochford If we should face a Dead-End AI future, the cybersecurity industry will continue to rely heavily on traditional approaches, especially human-driven ones. It won’t quite be business as usual though. The post What if the Current AI Hype Is

React to this headline:

Loading spinner

What if the Current AI Hype Is a Dead End? Read More »

How to avoid shadow AI in your SOC

How to avoid shadow AI in your SOC 24/05/2023 at 07:57 By Help Net Security Samsung’s recent discovery that employees had uploaded sensitive code to ChatGPT should serve as a reminder for security leaders to tread carefully when it comes to integrating new artificial intelligence tools throughout their organizations. Shadow AI Employees are using the

React to this headline:

Loading spinner

How to avoid shadow AI in your SOC Read More »

Scroll to Top