[eBook] 26 Cyber Security Facts from the Last 12 Months
Here is compilation of 26 Cyber Security Facts that we have referenced throughout our blog over the last 12 months. This 4-page eBook contains categorized facts and links to the original public...
View ArticleAutomated Security Operations for Managed Security Service Providers (MSSP)
While the security automation conversation generally focuses on enterprise and government Security Operations Centers (SOC), one of the largest groups that can benefit from automation are Managed...
View ArticleCyber Attacks Are, Most Likely, an Inside Job
According to “The Federal Insider Threat Report,” published by MeriTalk, approximately 50 percent of federal agencies were targeted by inside threats in the past year. Forty percent were unintentional...
View Article3 Burning Questions About Automating Vulnerability Lifecycle Management—Part 1
Vulnerability lifecycle management—the process of continually monitoring and managing an enterprise in order to identify, validate and remediate potential security risks—is critical for organizations...
View ArticleStudent Hacking: A Threat, but a Bigger Opportunity
Over the years we’ve seen massive cyber attacks on renowned brands like Ashley Madison, Target, Sony and Home Depot; however, not all attacks are aimed against corporations. Some of today’s most...
View Article3 Burning Questions About Automating Vulnerability Lifecycle Management—Part 2
In Part 1 of this series we discussed what vulnerability lifecycle management is, and why automating this process is crucial for long-term success. In an effort to help educate organizations on...
View Article3 Major Security Operations Mistakes
In a recent webinar, Swimlane Founder and CEO Cody Cornell elaborated on four major causes of unsustainable security operations: an unprecedented volume of attacks, alert fatigue, antiquated response...
View ArticleTop 4 Causes of Unsustainable Security Operations
It shouldn’t come as a surprise that organizations are struggling to establish and maintain superior security operations methods. In fact, only 45 percent of global organizations are confident in their...
View Article10 Hard-hitting Cyber Security Statistics
If one thing became clear in 2015, it was that no organization, regardless of its size or vertical, is safe from a data breach. A breach can happen to any organization at any time. Anthem, the IRS and...
View ArticleBest Practices to Fortify Your Cyber Security Strategy
There’s no question that the Denver Broncos beat the Carolina Panthers thanks to their defense. Defense alone carried the Broncos while Peyton Manning was out earlier in the season, and it carried them...
View ArticleCyber Attacks Are, Most Likely, an Inside Job
According to “The Federal Insider Threat Report,” published by MeriTalk, approximately 50 percent of federal agencies were targeted by inside threats in the past year. Forty percent were unintentional...
View Article3 Burning Questions About Automating Vulnerability Lifecycle Management—Part 1
Vulnerability lifecycle management—the process of continually monitoring and managing an enterprise in order to identify, validate and remediate potential security risks—is critical for organizations...
View ArticleStudent Hacking: A Threat, but a Bigger Opportunity
Over the years we’ve seen massive cyber attacks on renowned brands like Ashley Madison, Target, Sony and Home Depot; however, not all attacks are aimed against corporations. Some of today’s most...
View Article3 Burning Questions About Automating Vulnerability Lifecycle Management—Part 2
In Part 1 of this series we discussed what vulnerability lifecycle management is, and why automating this process is crucial for long-term success. In an effort to help educate organizations on...
View Article3 Major Security Operations Mistakes
In a recent webinar, Swimlane Founder and CEO Cody Cornell elaborated on four major causes of unsustainable security operations: an unprecedented volume of attacks, alert fatigue, antiquated response...
View ArticleTop 4 Causes of Unsustainable Security Operations
It shouldn’t come as a surprise that organizations are struggling to establish and maintain superior security operations methods. In fact, only 45 percent of global organizations are confident in their...
View Article10 Hard-hitting Cyber Security Statistics
If one thing became clear in 2015, it was that no organization, regardless of its size or vertical, is safe from a data breach. A breach can happen to any organization at any time. Anthem, the IRS and...
View ArticleBest Practices to Fortify Your Cyber Security Strategy
There’s no question that the Denver Broncos beat the Carolina Panthers thanks to their defense. Defense alone carried the Broncos while Peyton Manning was out earlier in the season, and it carried them...
View ArticleTwo 2017 Cyber Security Trends Every Security Operations Professional Should...
Key Findings of the PwC Global State of Information Security 2017 Every year a small number of landmark research surveys provide insight and understanding to enable more effective cyber security...
View ArticleThe Real Challenges Facing Security Operations Teams
With most organizations, the only thing standing between them and a data breach potentially resulting in huge financial losses is the Security Operations (SecOps) team. Every day they’re charged with...
View Article