Please turn on your JavaScript for this page to function normally.
security operations

IBM Watson to power cognitive security operations centers
At RSA Conference 2017, IBM Security announced Watson for Cyber Security, the industry’s first augmented intelligence technology designed to power cognitive security …

Network security operations becoming more difficult
One hundred and fifty enterprise IT security professionals from a wide range of industries were surveyed by Enterprise Strategy Group (ESG) to gain a better understanding of …

Siemplify brings military intelligence capabilities to enterprise security operations
Transforming the way enterprises perform cyberthreat analysis, Siemplify emerged from stealth mode with the first security operations platform to employ the same cybersecurity …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility