Blog Posts Tagged with "Automation"


Goodbye 2017, Hello 2018: New and Old Cloud Security Challenges

December 22, 2017 Added by:Sanjay Kalra

Security and compliance are going to be hot topics in 2018 as more and more organizations confront the challenges of the cloud.

Comments  (0)


Calming the Complexity: Bringing Order to Your Network 

October 20, 2017 Added by:Reuven Harrison

With multiple vendors and platforms in play, a growing number of devices connecting to the network and the need to manage it all – it’s easy to see why organizations can feel overwhelmed, unsure of the first step to take towards network management and security.

Comments  (0)


Access Management and the Automation of Things

February 21, 2017 Added by:Dean Wiech

Automated tasks make processes better for everyone involved, and result in a happy IT department, where leaders are empowered to live up to their professional potential without being cut off at the knees.

Comments  (0)


Why Is There a Shortage of Security Talent?

June 03, 2016 Added by:Ajit Sancheti

Embracing new technologies that help intelligently automate parts of security to provide overwhelmed security teams a hand is a start. But in the long run, bigger changes to security strategies will need to take place. Everyone in a company needs to be responsible for security, not just the CISO.

Comments  (0)


Reducing the Attack Surface is a Fool’s Errand

April 01, 2016 Added by:Paul Morville

This April Fool’s Day, let’s acknowledge that a security strategy focused exclusively on patching and prevention is a fool’s errand and let’s move towards an adaptive approach that includes prevention, detection, continuous visibility and response.

Comments  (0)


Why You Should Move Security Away from Security

March 31, 2016 Added by:Nimmy Reichenberg

Automating your security processes and aligning the various groups within your IT department is key to successfully migrating selected operations away from your security team.

Comments  (0)


Why Creating Automated User Provisioning Workflows is Important

December 01, 2015 Added by:Identropy

User provisioning platforms are at the heart of an identity management and governance infrastructure. Let’s just put it this way—if you haven’t automated your user provisioning by now to some degree, you’re doing it wrong.

Comments  (0)


When You Are Overwhelmed With Alerts, it is Time to Automate.

January 07, 2015 Added by:Michael Leland

Your security team is getting alerts from internal sensors, threat intelligence from multiple sources, and potential indicators of attack or compromise from your SIEM. Relying on these human filters to decode, deduce, and decide what is relevant takes valuable time and can result in long delays between attack, detection, and containment.

Comments  (2)


Here’s How The Amazing Twitter Infosec Team Helps DevOps

December 25, 2012 Added by:Gene Kim

Want to see how infosec integrates into a DevOps work stream? Watch this fantastic talk by Justin Collins, Neil Matatall, and Alex Smolen from Twitter, called “Put Your Robots To Work: Security Automation at Twitter..."

Comments  (0)


Automatic security response: What will it take for you to trust it?

November 13, 2012 Added by:Tripwire Inc

We need to evolve our security capabilities to a point where both the detection and the countermeasures can be automated and automatic. That is the only way we’ll get fast enough to prevent or at least significantly limi) the damage from unexpected attacks. The problem? We don’t tend to trust automation...

Comments  (0)


Why Patch Management is Vital to Your Business Network Security

October 22, 2012 Added by:Dan Dieterle

Patch management systems enable you to maintain full control of your systems’ patching activities. You can deploy security patches to test machines, and then push them out to all the rest of your machines, and also run reports to ensure that you have 100% compliance across all servers and workstations...

Comments  (15)


Seven Tips to Improve Patch Management

September 12, 2012 Added by:Dan Dieterle

The amount of time many companies spend on patching, the problems they have deploying patches, the perception that patching causes problems, and a general lack of understanding about what it takes to patch, all combine to make patching such a major issue...

Comments  (0)


Finishing the Security Automation Job

September 06, 2012 Added by:Tripwire Inc

SACM needs to grow upward and outward from where the SCAP efforts have gotten – move from controls into control frameworks and support the policies, processes, and procedures derived from Operational Risk Management. We’ve got a lot of work ahead. It’s all worth it...

Comments  (3)


Information Security, Hackers, and Vigilance

July 30, 2012 Added by:Tripwire Inc

The bottom line: Attackers are always looking for mistakes, outliers, and inconsistencies so they can use them against you. This means your security programs need to be robust, resilient, measurable, and – as much as possible – consistent (vs. ad hoc)...

Comments  (0)


Morphing Network Assets to Restrict Adversarial Reconnaissance

July 18, 2012 Added by:Headlines

"The intent of cyber maneuver is to place computer network defense technology into a proactive state, thereby shifting the advantage away from the attacker. By constantly changing the characteristics of the networks it resides on, MOPRHINATOR provides a more robust and trusted networking solution..."

Comments  (0)


The Resilient Enterprise: Resolving Issues Faster

July 03, 2012 Added by:Rafal Los

How can we both restore service quickly and solve a long-term systemic problems when we can't always tell that two issues are even related? Optimize the analysis between changes, connected systems and components to figure out dependencies in cases such as linked and distributed failures...

Comments  (0)

Page « < 1 - 2 > »
Most Liked