automation
![dark web mapped](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113223/dark-web-mapped-400x200.jpg)
Security analytics and operations are becoming more difficult
A new Enterprise Strategy Group (ESG) study, which involved a survey of more than 400 IT and cybersecurity professionals, found that 72 percent feel cybersecurity analytics …
![data](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09104953/data-400x200.jpg)
Cybersecurity analytics and operations: Need for automation and orchestration
New research from Enterprise Strategy Group (ESG) shows that when it comes to the evolution of Cybersecurity Analytics and Operations, 71% of respondent organizations find it …
![Globe](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113112/hand-globe-400x200.jpg)
Behavioural profiling: Spotting the signs of cyber attacks and misuse
Behavioural profiling is increasingly recognised as a new level of protection against cyber attacks and systems abuse, offering the potential to pick out new and unknown …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111725/brain-400x200.jpg)
Cybersecurity: To automate or not to automate?
There are seven vital automated IT security applications that will function as the stepping stones necessary to advance cybersecurity in the new world of artificial …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105241/money-400x200.png)
Can you justify your security spend?
In this podcast recorded at RSA Conference 2017, Todd Bramblett, President of Nehemiah Security, talks about why cyber risk has become such a hot topic, the importance of IT …
![DevSecOps](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104714/DevSecOps-400x200.jpg)
Software development teams embrace DevSecOps automation
Mature development organizations ensure automated security is woven into their DevOps practice, early, everywhere, and at scale, according to Sonatype. The adoption of DevOps …
![hybrid IT](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104712/hybrid-400x200.jpg)
Hybrid IT is becoming a standard enterprise model
Dimension Data research of 1,500 IT decision makers from multiple vertical industries across the US, Europe, Asia-Pacific and South Africa, reveals that hybrid IT is becoming …
![gears](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113120/gears-400x200.jpg)
Secure operations automation: Close the gap between security and operations teams
A new voke survey of 318 participants from companies of varying sizes globally, focuses on the need to operationalize security through secure operations automation practices …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112340/lock-400x200.jpg)
Automating PKI for the IoT platform
In this podcast recorded at RSA Conference 2017, Jeremy Rowley, Executive VP of Emerging Markets at DigiCert, talks about automating PKI for IoT platform and building scalable …
![users](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111706/users-400x200.jpg)
Qualys and Bugcrowd bring automation, crowdsourcing to web app security
At RSA Conference 2017, Qualys and Bugcrowd announced joint development integrations allowing joint customers the ability to share vulnerability data across automated web …
![Qualys](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111237/qualys-400x200.jpg)
Qualys brings web application security automation to a new level
At RSA Conference 2017, Qualys announced new functionality in its web application security offerings, including scalable fast scanning, detection and patching of websites, …
![Tesco Bank card](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105924/tesco-bank-card-400x200.jpg)
Did Tesco Bank attackers guess victims’ payment card details?
A group of researchers from Newcastle University have discovered a practical and easy way for attackers to quickly guess individuals’ Visa payment card info needed to …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD