automation
Cybersecurity: To automate or not to automate?
There are seven vital automated IT security applications that will function as the stepping stones necessary to advance cybersecurity in the new world of artificial …
Can you justify your security spend?
In this podcast recorded at RSA Conference 2017, Todd Bramblett, President of Nehemiah Security, talks about why cyber risk has become such a hot topic, the importance of IT …
Software development teams embrace DevSecOps automation
Mature development organizations ensure automated security is woven into their DevOps practice, early, everywhere, and at scale, according to Sonatype. The adoption of DevOps …
Hybrid IT is becoming a standard enterprise model
Dimension Data research of 1,500 IT decision makers from multiple vertical industries across the US, Europe, Asia-Pacific and South Africa, reveals that hybrid IT is becoming …
Secure operations automation: Close the gap between security and operations teams
A new voke survey of 318 participants from companies of varying sizes globally, focuses on the need to operationalize security through secure operations automation practices …
Automating PKI for the IoT platform
In this podcast recorded at RSA Conference 2017, Jeremy Rowley, Executive VP of Emerging Markets at DigiCert, talks about automating PKI for IoT platform and building scalable …
Qualys and Bugcrowd bring automation, crowdsourcing to web app security
At RSA Conference 2017, Qualys and Bugcrowd announced joint development integrations allowing joint customers the ability to share vulnerability data across automated web …
Qualys brings web application security automation to a new level
At RSA Conference 2017, Qualys announced new functionality in its web application security offerings, including scalable fast scanning, detection and patching of websites, …
Did Tesco Bank attackers guess victims’ payment card details?
A group of researchers from Newcastle University have discovered a practical and easy way for attackers to quickly guess individuals’ Visa payment card info needed to …
Key causes of network outages and vulnerabilities
A new global study, conducted by Dimensional Research, surveyed 315 network professionals about their experiences with network outages, vulnerabilities and compliance. How …
Security orchestration and automation: Closing the gap in incident response
Companies in North America are poised to increase their reliance on security orchestration and automation for incident response (IR), according to Enterprise Strategy Group …
US gets federal guidelines for safe deployment of self-driving cars
The Obama Administration has issued a new Federal Automated Vehicles Policy to help facilitate the responsible introduction of self-driving cars. The policy sets a proactive …