newsIBM offers integrated security management with QRadar releaseIBM’s new QRadar offering for security operations teams, announced at RSA, aims to pull together large customers’ heterodox security environments.By Jon Gold24 Apr 20233 minsRSA ConferenceSecurity Information and Event Management SoftwareSecurity Operations Center opinion Views of a hot cyberwar -- the Ukrainian perspective on Russia's online assaultBy Christopher Burgess04 Apr 20235 minsData and Information SecuritySecurity InfrastructureSecurity Practicesopinion The changing role of the MITRE ATT&CK frameworkBy Jon Oltsik06 Dec 20225 minsSecurity Operations CenterThreat and Vulnerability Management opinionXDR: Still confusing after all these yearsBy Jon Oltsik 16 Nov 20224 minsSecurity Operations CenterEndpoint ProtectionNetwork Security opinionMaking the case for security operation automationBy Jon Oltsik 03 Nov 20224 minsSecurity Operations Center newsInformation overload, burnout, talent retention impacting SOC performanceBy Michael Hill 12 Oct 20226 minsCSO and CISOSecurity Operations Center analysis5 reasons why security operations are getting harderBy Jon Oltsik 06 Oct 20223 minsSecurity Operations Center opinionTransparency and policy shapes Cloudflare's Kiwi Farms decisionsBy Christopher Burgess 06 Sep 20225 minsSecurity InfrastructureSecurity news analysisNIST CSF 2.0 Workshop emphasizes global appeal, metrics and assessmentBy Cynthia Brumfield 18 Aug 20228 minsIT Governance FrameworksSecurity Infrastructure Articlesfeature4 key benefits of NOC/SOC integration and tips for making it workCompanies that have started the SOC/NOC integration process report improved security and operational efficiencies, but had to overcome technical and cultural challenges. By Neal Weinberg 14 May 2020 8 minsNetwork SecuritySecurity InfrastructureSecuritynews analysisOpen-source options offer increased SOC tool interoperabilityToo many security tools in your SOC, and none of them talk to each other, but new vendor-supported open-source projects might lead to greater interoperability.By J.M. Porup 11 Mar 2020 4 minsNetwork SecuritySecurity InfrastructureSecurityfeatureClosing the security gap in OT/IT convergenceEnd-to-end security between converging information technology and operational technology worlds is imperative, but technical and cultural differences separate them. Here’s how to close the gap.By Stacy Collett 27 Jan 2020 8 minsInternet of ThingsSecurity InfrastructureSecurityopinionWhat lessons can we learn from Notre Dame to better prepare for cyberattacks?The Notre Dame cathedral – one of mankind’s greatest achievements – is not only a monument to Catholicism, but also to the French people who built and maintained this landmark over centuries…and will now rebuild this icon again. As infosec professionals, we can learn many lessons from this event and use them to build better architectures for our customers.By Mitchell Parker 16 Apr 2019 9 minsTechnology IndustryData and Information SecuritySecurity InfrastructurefeatureWhy fake data is a serious IoT security concernFake internet of things data could break your business and kill your customers.By Dan Swinhoe 07 Nov 2018 10 minsInternet of ThingsSecurity InfrastructureSecurityfeatureIs your security operations center TTP0?The new TTP0 community wants to do for SOCs what OWASP has done for web security. It will help CISOs improve their threat intelligence and threat hunting capabilities as well. By Roger Grimes 31 Oct 2018 6 minsSecurity InfrastructureSecurityfeature7 best practices for working with cybersecurity startupsSecurity startups are often ahead of the technology curve and can provide more personalized service. Here's how to find the best of them and minimize risks.By Maria Korolov 09 Oct 2018 9 minsRisk ManagementSecurity InfrastructureSecurityreviewsBruce Schneier’s Click Here to Kill Everybody reveals the looming cybersecurity crisisBook review: A sobering look at how everything is broken and nobody wants to fix itBy J.M. Porup 03 Oct 2018 8 minsCyberattacksSecurity InfrastructureSecuritynews analysisHacking smart buildingsForget about internet-connected toasters. Your "intelligent" office building is one giant, vulnerable IoT device.By J.M. Porup 05 Sep 2018 7 minsInternet of ThingsPhysical SecuritySecurity Infrastructure Show more Show less View all Resources whitepaper Breakthrough with Modern Security: How CIOs Can Enhance Cyber Resilience The recent rapid acceleration of digital transformation and distributed work has changed the game in cybersecurity. When most employees worked exclusively from an office, the boundaries for cybersecurity were clearer. The post Breakthrough with Modern Security: How CIOs Can Enhance Cyber Resilience appeared first on Whitepaper Repository. By Dell Technologies 18 May 2023Cloud SecurityCybercrimeSecurity whitepaper Data Protection in a Multicloud World By Dell Technologies 18 May 2023Cloud SecurityData and Information SecurityMulti Cloud whitepaper Top reasons why customers choose Dell VxRail By Dell Technologies 18 May 2023Infrastructure ManagementIT ManagementSystem Management View all Podcasts podcastsStrengthen and Streamline Your SecurityThis podcast series brought to you by Microsoft and IDG, will explore the core components of a modern security strategy, with insights and tips from leading security experts. We'll discuss how ongoing and ever-changing threats, a growing security stack, and a shift to remote work make it difficult for CISOs and their security teams to balance enterprise-grade security with end-user productivity.0 episodeData and Information Security Ep. 03 Episode 3: The Zero Trust Model 25 Mar 202115 mins Multi-factor AuthenticationCSO and CISORemote Work Ep. 04 Episode 4: Reduce SOC burnout 29 Mar 202115 mins CSO and CISOPhishingRemote Work Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Software Development Vulnerabilities Generative AI Show me morePopularArticles opinion What is the dark web? How to access it and what you'll find By Darren Guccione 01 Jul 202111 mins Data BreachTechnology IndustryCybercrime