Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
It’s time to stop debating about what XDR is and focus on how it fits in a security operations center modernization strategy. → Read More
Most organizations are automating security operations processes and achieving benefits. An intelligent strategy and appropriate technology decisions can accelerate these projects. → Read More
MITRE ATT&CK and new security technology innovation make this possible. → Read More
Disjointed tools and manual processes provide an incomplete and unacceptable picture of cyber-risk. → Read More
Organizations are both adopting XDR technology and modernizing the SOC. New ESG research points to areas of potential overlap and even conflict between those two initiatives. → Read More
Security executives are interested in how ZT vendors will integrate with existing technologies, supplement ongoing projects, and support business processes. → Read More
Increasing scale and complexity have made keeping up with security hygiene and posture management cumbersome and error prone, leaving organizations exposed. Here's what leading CISOs are doing to close the gap. → Read More
Beyond threat detection and response, CISOs should think of XDR as an opportunity to modernize the SOC, automating processes, and improving staff productivity. Here's your XDR game plan for 2021. → Read More
Highlights from the fourth annual “Life and Times of Cybersecurity Professionals” report → Read More
COVID-19 has opened the cyberattack floodgates; defenders need strong cyber threat intelligence (CTI) analysis, operationalization and sharing. Here's how to get more from your CTI program. → Read More
The scramble to enable remote workers changes security strategies, priorities, and workflows for 2020. → Read More
New ESG research finds organizations are aggressively replacing on-premises security analytics and operations technologies with cloud-based alternatives. The shift comes with both short-term wins and strategic benefits. → Read More
New research indicates that things are not improving for filling the demand for cybersecurity skills. The ramifications are widespread. → Read More
An overwhelming attack surface, voluminous vulnerabilities, sophisticated threats, and new business requirements demand a new cyber risk management model. → Read More
Cybersecurity professionals ranked the most important attributes of a cybersecurity technology platform according to strict definitions that meet their requirements. → Read More
The company articulates its device-to-cloud security strategy with vision and series of announcements. → Read More
At Splunk .Conf 2018, we learned how the company continues to expand its cybersecurity footprint, work with industry partners, and commit to customer success. → Read More
A cybersecurity platform should have coverage across major threat vectors, central management, and technologies for prevention, detection, and response in any security platform. → Read More
Information security professionals working at enterprise organizations want to work with vendors who have experience with business/IT initiatives and industry knowledge → Read More
Massive network security changes, cloud adoption, and a pressing need for network security process automation were among the things discussed at Tufin's customer conference. → Read More