Quantcast
Channel: Blog – Swimlane
Browsing all 72 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

[eBook] 26 Cyber Security Facts from the Last 12 Months

Here is compilation of 26 Cyber Security Facts that we have referenced throughout our blog over the last 12 months. This 4-page eBook contains categorized facts and links to the original public...

View Article


Image may be NSFW.
Clik here to view.

Automated Security Operations for Managed Security Service Providers (MSSP)

While the security automation conversation generally focuses on enterprise and government Security Operations Centers (SOC), one of the largest groups that can benefit from automation are Managed...

View Article


Image may be NSFW.
Clik here to view.

Cyber Attacks Are, Most Likely, an Inside Job

According to “The Federal Insider Threat Report,” published by MeriTalk, approximately 50 percent of federal agencies were targeted by inside threats in the past year. Forty percent were unintentional...

View Article

Image may be NSFW.
Clik here to view.

3 Burning Questions About Automating Vulnerability Lifecycle Management—Part 1

Vulnerability lifecycle management—the process of continually monitoring and managing an enterprise in order to identify, validate and remediate potential security risks—is critical for organizations...

View Article

Image may be NSFW.
Clik here to view.

Student Hacking: A Threat, but a Bigger Opportunity

Over the years we’ve seen massive cyber attacks on renowned brands like Ashley Madison, Target, Sony and Home Depot; however, not all attacks are aimed against corporations. Some of today’s most...

View Article


Image may be NSFW.
Clik here to view.

3 Burning Questions About Automating Vulnerability Lifecycle Management—Part 2

In Part 1 of this series we discussed what vulnerability lifecycle management is, and why automating this process is crucial for long-term success. In an effort to help educate organizations on...

View Article

Image may be NSFW.
Clik here to view.

3 Major Security Operations Mistakes

In a recent webinar, Swimlane Founder and CEO Cody Cornell elaborated on four major causes of unsustainable security operations: an unprecedented volume of attacks, alert fatigue, antiquated response...

View Article

Image may be NSFW.
Clik here to view.

Top 4 Causes of Unsustainable Security Operations

It shouldn’t come as a surprise that organizations are struggling to establish and maintain superior security operations methods. In fact, only 45 percent of global organizations are confident in their...

View Article


Image may be NSFW.
Clik here to view.

10 Hard-hitting Cyber Security Statistics

If one thing became clear in 2015, it was that no organization, regardless of its size or vertical, is safe from a data breach. A breach can happen to any organization at any time. Anthem, the IRS and...

View Article


Image may be NSFW.
Clik here to view.

Best Practices to Fortify Your Cyber Security Strategy

There’s no question that the Denver Broncos beat the Carolina Panthers thanks to their defense. Defense alone carried the Broncos while Peyton Manning was out earlier in the season, and it carried them...

View Article

Image may be NSFW.
Clik here to view.

Cyber Attacks Are, Most Likely, an Inside Job

According to “The Federal Insider Threat Report,” published by MeriTalk, approximately 50 percent of federal agencies were targeted by inside threats in the past year. Forty percent were unintentional...

View Article

Image may be NSFW.
Clik here to view.

3 Burning Questions About Automating Vulnerability Lifecycle Management—Part 1

Vulnerability lifecycle management—the process of continually monitoring and managing an enterprise in order to identify, validate and remediate potential security risks—is critical for organizations...

View Article

Image may be NSFW.
Clik here to view.

Student Hacking: A Threat, but a Bigger Opportunity

Over the years we’ve seen massive cyber attacks on renowned brands like Ashley Madison, Target, Sony and Home Depot; however, not all attacks are aimed against corporations. Some of today’s most...

View Article


Image may be NSFW.
Clik here to view.

3 Burning Questions About Automating Vulnerability Lifecycle Management—Part 2

In Part 1 of this series we discussed what vulnerability lifecycle management is, and why automating this process is crucial for long-term success. In an effort to help educate organizations on...

View Article

Image may be NSFW.
Clik here to view.

3 Major Security Operations Mistakes

In a recent webinar, Swimlane Founder and CEO Cody Cornell elaborated on four major causes of unsustainable security operations: an unprecedented volume of attacks, alert fatigue, antiquated response...

View Article


Image may be NSFW.
Clik here to view.

Top 4 Causes of Unsustainable Security Operations

It shouldn’t come as a surprise that organizations are struggling to establish and maintain superior security operations methods. In fact, only 45 percent of global organizations are confident in their...

View Article

Image may be NSFW.
Clik here to view.

10 Hard-hitting Cyber Security Statistics

If one thing became clear in 2015, it was that no organization, regardless of its size or vertical, is safe from a data breach. A breach can happen to any organization at any time. Anthem, the IRS and...

View Article


Image may be NSFW.
Clik here to view.

Best Practices to Fortify Your Cyber Security Strategy

There’s no question that the Denver Broncos beat the Carolina Panthers thanks to their defense. Defense alone carried the Broncos while Peyton Manning was out earlier in the season, and it carried them...

View Article

Image may be NSFW.
Clik here to view.

Two 2017 Cyber Security Trends Every Security Operations Professional Should...

Key Findings of the PwC Global State of Information Security 2017 Every year a small number of landmark research surveys provide insight and understanding to enable more effective cyber security...

View Article

Image may be NSFW.
Clik here to view.

The Real Challenges Facing Security Operations Teams

With most organizations, the only thing standing between them and a data breach potentially resulting in huge financial losses is the Security Operations (SecOps) team.  Every day they’re charged with...

View Article
Browsing all 72 articles
Browse latest View live