News
How to Bring the Power of No-Code Security Automation to Your Team in 2022

Seven in 10 SOC analysts say they are “burned out.” Six in 10 plan to leave their job “in the next year.” Tines CEO Eoin Hinchy says no-code automation may be...

Read more
News
Why Security Practitioners Are Unhappy With Their Current SIEM

In this Expert Insight, Jack Naglieri, the CEO of Panther, writes about how today’s cloud-centric and data-driven environments make the SIEM technologies of the past inadequate and demand new approaches to security monitoring. The post...

Read more
News
State of Modern Application Security: 6 Key Takeaways For 2022

In this Expert Insight, Harshil Parikh, CEO of Tromzo, reveals findings from the company's recent State of Modern Application Security Report, a survey of 400 appsec professionals. The post State of Modern Application Security: 6...

Read more
News
Tapping into the Power of the Security Community

Massive growth in Zoom’s customer base as a result of the COVID 19 pandemic brought new business - but also new challenges and security requirements. Establishing a CISO Council gave those...

Read more
News
Spotting Hackers at the Pace of XDR – From Alerts to Incidents

Extended Detection and Response (XDR) technology is gaining traction within enterprises. But how can organizations handle the increased volume of alerts XDR systems produce? Samuel Jones, of cyber AI firm Stellar...

Read more
News
What SolarWinds Tells Us About Securing the Software Development Supply Chain

The recent SolarWinds attack highlights an Achilles heel for enterprises: software updates for critical enterprise applications. Digital signing of code is one solution, but organizations need to modernize their code signing...

Read more
News
The SOC Hop Needs to be a Relic of the Past

Overworked, understaffed teams constantly jumping from one fire to the next - exhausted and reactive to events and alerts. The “SOC hop” is not sustainable. The post The SOC Hop Needs...

Read more
News
Can Blockchain Solve Data’s Integrity Problem?

The rapid digitalization and automation of business processes makes data integrity critical, as low-quality data risks infecting automated business decision process. Authors Dan Geer and T. Mark Morley suggest that blockchain...

Read more
News
Futility or Fruition?Rethinking Common Approaches To Cybersecurity

The current approaches most organizations take towards security are not good enough, writes Albert Zhichun Li, the Chief Security Scientist at Stellar Cyber. Something has to change. The post Futility or Fruition?Rethinking...

Read more
News
Keyboard to the internet
PKI Points the Way for Identity and Authentication in IoT

Modern enterprise networks are populated by both people and, increasingly, “things.” But securing the growing population of Internet of Things devices presents unique challenges. In this thought leadership article, Brian Trzupek, the Senior Vice President of Emerging Markets at DigiCert discusses what is needed for effective IoT security. We’ve seen the IoT come of age […]

Read more