newsMost UK councils have outdated cybersecurity, cannot afford cost of a breachA quarter of UK councils say they have made “no progress” on cybersecurity.By Michael Hill04 May 20233 minsCyberattacksGovernmentSecurity Operations Center news IBM offers integrated security management with QRadar releaseBy Jon Gold24 Apr 20233 minsRSA ConferenceSecurity Information and Event Management SoftwareSecurity Operations Centeropinion Views of a hot cyberwar -- the Ukrainian perspective on Russia's online assaultBy Christopher Burgess04 Apr 20235 minsData and Information SecuritySecurity InfrastructureSecurity Practices opinionThe changing role of the MITRE ATT&CK frameworkBy Jon Oltsik 06 Dec 20225 minsSecurity Operations CenterThreat and Vulnerability Management opinionXDR: Still confusing after all these yearsBy Jon Oltsik 16 Nov 20224 minsSecurity Operations CenterEndpoint ProtectionNetwork Security opinionMaking the case for security operation automationBy Jon Oltsik 03 Nov 20224 minsSecurity Operations Center newsInformation overload, burnout, talent retention impacting SOC performanceBy Michael Hill 12 Oct 20226 minsCSO and CISOSecurity Operations Center analysis5 reasons why security operations are getting harderBy Jon Oltsik 06 Oct 20223 minsSecurity Operations Center opinionTransparency and policy shapes Cloudflare's Kiwi Farms decisionsBy Christopher Burgess 06 Sep 20225 minsSecurity InfrastructureSecurity ArticlesfeatureHow to reboot a broken or outdated security strategyCISOs talk about how they identify when they need a new security strategy and the process of developing it and selling the reboot to stakeholders.By John Edwards 18 Jan 2021 7 minsSecurity InfrastructureSecurityfeature4 key benefits of NOC/SOC integration and tips for making it workCompanies that have started the SOC/NOC integration process report improved security and operational efficiencies, but had to overcome technical and cultural challenges. By Neal Weinberg 14 May 2020 8 minsNetwork SecuritySecurity InfrastructureSecuritynews analysisOpen-source options offer increased SOC tool interoperabilityToo many security tools in your SOC, and none of them talk to each other, but new vendor-supported open-source projects might lead to greater interoperability.By J.M. Porup 11 Mar 2020 4 minsNetwork SecuritySecurity InfrastructureSecurityfeatureClosing the security gap in OT/IT convergenceEnd-to-end security between converging information technology and operational technology worlds is imperative, but technical and cultural differences separate them. Here’s how to close the gap.By Stacy Collett 27 Jan 2020 8 minsInternet of ThingsSecurity InfrastructureSecurityopinionWhat lessons can we learn from Notre Dame to better prepare for cyberattacks?The Notre Dame cathedral – one of mankind’s greatest achievements – is not only a monument to Catholicism, but also to the French people who built and maintained this landmark over centuries…and will now rebuild this icon again. As infosec professionals, we can learn many lessons from this event and use them to build better architectures for our customers.By Mitchell Parker 16 Apr 2019 9 minsTechnology IndustryData and Information SecuritySecurity InfrastructurefeatureWhy fake data is a serious IoT security concernFake internet of things data could break your business and kill your customers.By Dan Swinhoe 07 Nov 2018 10 minsInternet of ThingsSecurity InfrastructureSecurityfeatureIs your security operations center TTP0?The new TTP0 community wants to do for SOCs what OWASP has done for web security. It will help CISOs improve their threat intelligence and threat hunting capabilities as well. By Roger Grimes 31 Oct 2018 6 minsSecurity InfrastructureSecurityfeature7 best practices for working with cybersecurity startupsSecurity startups are often ahead of the technology curve and can provide more personalized service. Here's how to find the best of them and minimize risks.By Maria Korolov 09 Oct 2018 9 minsRisk ManagementSecurity InfrastructureSecurityreviewsBruce Schneier’s Click Here to Kill Everybody reveals the looming cybersecurity crisisBook review: A sobering look at how everything is broken and nobody wants to fix itBy J.M. Porup 03 Oct 2018 8 minsCyberattacksSecurity InfrastructureSecuritynews analysisHacking smart buildingsForget about internet-connected toasters. Your "intelligent" office building is one giant, vulnerable IoT device.By J.M. Porup 05 Sep 2018 7 minsInternet of ThingsPhysical SecuritySecurity Infrastructure Show more Show less View all Resources whitepaper The shift to a security approach for the full application stack This whitepaper discusses how technologists can optimize security for modern application stacks. The post The shift to a security approach for the full application stack appeared first on Whitepaper Repository. By WWT & AppDynamics 05 May 2023Application Performance ManagementEmerging TechnologyIT Management View all Podcasts podcastsStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We'll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.0 episodeData and Information Security Ep. 03 Episode 3: The Zero Trust Model 25 Mar 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout 29 Mar 202115 mins CSO and CISOPhishingRemote Work Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Software Development Vulnerabilities Generative AI Show me morePopularArticles opinion What is the dark web? How to access it and what you'll find By Darren Guccione 01 Jul 202111 mins Data BreachTechnology IndustryCybercrime