Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Microsoft's Coordinated Disclosure Discussion from BlackHat & DefCon '22

Security Insights welcomes its new host, Ashley Stryker, into the mix! In today's episode, Chris Goettl and Daniel Spicer break down some backlash from Microsoft customers on their failure to disclose a “ninja patch” on a vulnerability researchers found months before the fix. Listen in as the trio discuss security transparency and best practices for vendor coordinated disclosures of vulnerabilities for cloud versus on-prem products and much more!

3 ways to implement Zero Trust in a legacy environment

Trust is a very fickle partner to rely on in the IT sector primarily due to the incessant barrage of security threats from both external and internal actors. This is why government, enterprise, and other types of organizations hold cybersecurity as a top priority as hackers discover ever more ingenious ways to stay under the radar.

Debunking the Myth of XDR

One of the biggest buzzwords (or really, buzz acronyms) to pop up in the cybersecurity space in recent years is XDR, or, extended detection and response. The term was coined in 2018 by Nir Zuk, CTO and co-founder of Palo Alto Networks. It was posited as a new way to think about security, where data is taken from several platforms and it gets correlated and analyzed.

SecurityDAM's NOC Management Takes Off With MoovingON.ai Platform

When SecurityDAM (acquired by Radware), a DDoS protection service provider, needed to upgrade their NOC operations, they tested out multiple solutions before choosing MoovingON.ai. From increasing efficiency and visibility to improving ticket resolution times and runbook automation, MoovingON.ai provided the NOC manager and team with everything they needed to run operations more smoothly and effectively.

Three New Standards Compound Security Engineering Challenges

A recent ESG/ISSA survey highlighted that security professionals are overwhelmed with competing proprietary data standards and integration challenges. Today’s security landscape often comprises dozens of tools, each with its own unique format. Even if the format is defined and widely adopted, like Syslog, implementations vary widely from tool to tool, or even from release to release for the same tool. How big of a problem are these differing data formats?

Sponsored Post

5 Questions to Ask When Developing an Automation Strategy

Automation is like running a marathon. It sounds like a great and noble pursuit until you actually go out and start pursuing it. At that point, it's easy to fail if you don't prepare yourself ahead of time for the challenges that are inherent to the process. Indeed, although automation can provide a number of awesome benefits, whether you actually reap those benefits depends on how easy it is to implement and manage automation tools. And, as many teams discover, doing these things may be harder than it often seems.

How to Prevent Ransomware? A Quick Guide to Protect Your Company Data

Cybersecurity is more important now than ever before. With ransomware and other types of cyberattacks on the rise, it’s crucial to take precautions to protect your data by learning how to prevent ransomware. Ransomware, unfortunately, is one of the ubiquitous scourges on the internet. You’ll have to take every possible measure to protect against it. If you leave things up to chance, you’ll incur severe financial losses or compromise mission-critical information and resources.

What is a Security Operation Center and how do SOC teams work?

With the growing complexity of IT environments, it is essential to have robust security processes that can safeguard IT environments from cyber threats. In this blog, we will explore how security operation centers (SOCs), help you monitor, identify and prevent cyber threats to safeguard your IT environments. This blog covers the following pointers.

5 Best Practices of Network Security Monitoring

According to Accenture’s “State of Cybersecurity Resilience 2021” report, security attacks have increased 31% from 2021 to 2022. This statistic shows that organizations are not ready with a robust security plan and lack continuous network monitoring, resulting in security loopholes. Efficient network infrastructure is crucial for the success of your enterprise.