automation
![lights](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110827/lights-400x200.jpg)
Key causes of network outages and vulnerabilities
A new global study, conducted by Dimensional Research, surveyed 315 network professionals about their experiences with network outages, vulnerabilities and compliance. How …
![gear](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110730/gear-400x200.jpg)
Security orchestration and automation: Closing the gap in incident response
Companies in North America are poised to increase their reliance on security orchestration and automation for incident response (IR), according to Enterprise Strategy Group …
![Car](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112931/car-hacking-400x200.jpg)
US gets federal guidelines for safe deployment of self-driving cars
The Obama Administration has issued a new Federal Automated Vehicles Policy to help facilitate the responsible introduction of self-driving cars. The policy sets a proactive …
![Danger](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110650/danger-400x200.jpg)
Macro-based malware evolves to bypass traditional defenses
Macro-based malware is growing into full-featured malware capable of detecting and bypassing traditional security tools, Barkly researchers have discovered. Macro-based …
![gear](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110730/gear-400x200.jpg)
Automation isn’t one-size fits all
It’s no secret that security teams are understaffed despite increased pressure to deliver. Firewall engineers face an additional challenge when it comes to access request …
![threat hunting](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113059/threat-hunting-400x200.jpg)
Open sourced: Cyber reasoning system that won third place in DARPA’s Cyber Grand Challenge
Earlier this month, the DARPA-backed Cyber Grand Challenge (CGC) has shown that a future in which computer systems will (wholly or partially) replace bug hunters and patchers …
![DARPA Cyber Grand Challenge](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111456/cyber_grand_challenge-400x200.jpg)
Can a computer system compete against human CTF experts?
DARPA announced on Thursday that a computer system designed by a team of Pittsburgh-based researchers is the presumptive winner of the Agency’s Cyber Grand Challenge. The …
![Building](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194404/corporate9-400x200.jpg)
Weak default credentials, command injection bug found in building operation software
A vulnerability in servers programmed with Schneider Electric’s StruxureWare Building Operation software can be exploited by a low-skilled, remote attacker to gain access to …
![phantom](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113907/phantom-featured-400x200.jpg)
Phantom named RSA Conference 2016’s Most Innovative Startup
RSA Conference has named Phantom “RSAC Most Innovative Startup 2016″ in its Innovation Sandbox Contest. A panel of venture capitalists, entrepreneurs and large security …
Featured news
Sponsored
Don't miss
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD
- Realm: Open-source adversary emulation framework
- Discover the growing threats to data security
- Encrypted traffic: A double-edged sword for network defenders