Please turn on your JavaScript for this page to function normally.
brain
Cybersecurity: To automate or not to automate?

There are seven vital automated IT security applications that will function as the stepping stones necessary to advance cybersecurity in the new world of artificial …

money
Can you justify your security spend?

In this podcast recorded at RSA Conference 2017, Todd Bramblett, President of Nehemiah Security, talks about why cyber risk has become such a hot topic, the importance of IT …

DevSecOps
Software development teams embrace DevSecOps automation

Mature development organizations ensure automated security is woven into their DevOps practice, early, everywhere, and at scale, according to Sonatype. The adoption of DevOps …

hybrid IT
Hybrid IT is becoming a standard enterprise model

Dimension Data research of 1,500 IT decision makers from multiple vertical industries across the US, Europe, Asia-Pacific and South Africa, reveals that hybrid IT is becoming …

gears
Secure operations automation: Close the gap between security and operations teams

A new voke survey of 318 participants from companies of varying sizes globally, focuses on the need to operationalize security through secure operations automation practices …

lock
Automating PKI for the IoT platform

In this podcast recorded at RSA Conference 2017, Jeremy Rowley, Executive VP of Emerging Markets at DigiCert, talks about automating PKI for IoT platform and building scalable …

users
Qualys and Bugcrowd bring automation, crowdsourcing to web app security

At RSA Conference 2017, Qualys and Bugcrowd announced joint development integrations allowing joint customers the ability to share vulnerability data across automated web …

Qualys
Qualys brings web application security automation to a new level

At RSA Conference 2017, Qualys announced new functionality in its web application security offerings, including scalable fast scanning, detection and patching of websites, …

Tesco Bank card
Did Tesco Bank attackers guess victims’ payment card details?

A group of researchers from Newcastle University have discovered a practical and easy way for attackers to quickly guess individuals’ Visa payment card info needed to …

lights
Key causes of network outages and vulnerabilities

A new global study, conducted by Dimensional Research, surveyed 315 network professionals about their experiences with network outages, vulnerabilities and compliance. How …

gear
Security orchestration and automation: Closing the gap in incident response

Companies in North America are poised to increase their reliance on security orchestration and automation for incident response (IR), according to Enterprise Strategy Group …

Car
US gets federal guidelines for safe deployment of self-driving cars

The Obama Administration has issued a new Federal Automated Vehicles Policy to help facilitate the responsible introduction of self-driving cars. The policy sets a proactive …

Don't miss

Cybersecurity news