Please turn on your JavaScript for this page to function normally.
lock
How enterprises use security operations to modernize their business

CyberRes published a report which provides insights into how enterprises are utilizing security operations to modernize their business, secure the digital value chain and …

Bitwarden helps MSPs provide enterprise-ready security solutions to their customers

Bitwarden announced a new offering that empowers Managed Service Providers (MSPs) to easily deliver password management-as-a-service for their clients. This release expands …

Microsoft 365
Why you need to make Microsoft 365 a 24/7 security priority

It’s easy to take advantage of the Microsoft 365 service, but are you taking the steps to properly secure all the data your company is storing inside of it? For security …

sharing
Adverse security implications of enterprises network overprovisioning

Accedian released a research study examining the adverse security implications of network overprovisioning in enterprises and the common practices and concerns surrounding it. …

drown
How building a world class SOC can alleviate security team burnout 

For security leaders, building a mature Security Operations Center is about establishing robust processes that bring teams and technology together for success. Yet many SOC …

BehavioSec extends its behavioral biometrics platform into a SOC/ISO compliant SaaS version

BehavioSec announced that it has extended its patented technology and BehavioSense platform into a SOC/ISO compliant, hosted-version and a cloud-native, SaaS version. These …

Box Sign delivers unlimited signatures to customers at no additional cost

Box began rolling out Box Sign, its native e-signature capability, to customers on Business and Enterprise plans at no additional cost. With this launch, Box Sign delivers …

XDR
XDR: Security’s new frontier

As enterprises transform their IT environment and workforce, finding the right security approach is critical for success. Without the proper protective measures in place, …

drown
SOC burnout is real: 3 preventative steps every CISO must take

Consider this scenario: Morgan, a level 3 security analyst, arrives to a twelve-hour security operations center (SOC) shift and finds a message that a network sensor is …

virtual soc
How do I select a virtual SOC solution for my business?

Other than a traditional SOC (security operations center) model, which offers continuous system monitoring to improve an organization’s security posture, there is also a …

drown
The human cost of understaffed SOCs

SOC and IT security teams are suffering from high levels of stress outside of the working day – with alert overload a prime culprit, a Trend Micro study reveals. …

Sophos XDR
Sophos XDR: Threat hunting through the entire security ecosystem

Almost a decade ago, ransomware started becoming a prominent consumer problem, locking computers and threatening users with fines and jail time for supposedly downloading …

Don't miss

Cybersecurity news