automation

SaaS adoption growing, but so are security concerns
A BetterCloud survey of more than 500 IT and security professionals reveals the latest challenges of managing SaaS at scale, particularly as digital transformation catapulted …

DEX management maturity key to succeed in the future remote work
1E revealed the DEX maturity model, created by Forrester Consulting. The maturity model looks at the state of remote and hybrid work and provides a path for organizations to …

How CISOs plan to accelerate the adoption of automation
ThreatQuotient released the State of Cyber Security Automation Adoption in 2021, new research focused on understanding the importance, challenges and trends facing businesses …

Combating vulnerability fatigue with automated security validation
Security operations teams have been dealing with “alert fatigue” for far too long. The introduction of log monitoring (e.g., SIEM), firewall, and AV technologies over two …

Certificates volume growing, most enterprises considering PKI automation to reduce risks
The typical enterprise manages over 50,000 publicly and privately trusted PKI certificates, a DigiCert survey shows. Manually managing this volume of certificates can lead to …

How to avoid the pitfalls of multi-cloud strategy deployment
Making the decision to implement a multi-cloud strategy is difficult. From the decision to pursue a multi-cloud journey to defining the requirements to laying the foundation …

Automation is not here to close the cybersecurity skills shortage gap, but it can help
In this interview with Help Net Security, Daniel Clayton, VP Global Security Services and Support at Bitdefender, talks about the cybersecurity skills shortage gap and the …

Leveraging AI and automation to identify sensitive data at scale
In this interview with Help Net Security, Apoorv Agarwal, CEO at Text IQ, talks about the risk of unstructured data for organizations and the opportunity to leverage AI and …

What businesses need to know about data decay
Data decay is the aging and obsolescence of data in such a way that makes it no longer usable due to loss of its integrity, completeness, and accuracy. Data that can no longer …

5G trends accelerating, all major regions pursuing 5G Core testing and deployments
5G trends are continuing to accelerate, with 5G SA Core evaluation, testing and launch activities growing significantly across all geographic regions, according to Spirent. In …

9 tips to avoid cloud configuration conundrums
Configuration-related errors continue to result in avoidable losses of customer data and, consequently, their trust and loyalty, as well as revenue. The recent T-Mobile breach …

Three ways to keep your organization safe from cyberattacks
Cyberattacks continue making headlines as more companies fall victim to ransomware. Throughout the past year, we saw some of the largest breaches, leaks, and real-world …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility