How enterprises use security operations to modernize their business
CyberRes published a report which provides insights into how enterprises are utilizing security operations to modernize their business, secure the digital value chain and …
Bitwarden helps MSPs provide enterprise-ready security solutions to their customers
Bitwarden announced a new offering that empowers Managed Service Providers (MSPs) to easily deliver password management-as-a-service for their clients. This release expands …
Why you need to make Microsoft 365 a 24/7 security priority
It’s easy to take advantage of the Microsoft 365 service, but are you taking the steps to properly secure all the data your company is storing inside of it? For security …
Adverse security implications of enterprises network overprovisioning
Accedian released a research study examining the adverse security implications of network overprovisioning in enterprises and the common practices and concerns surrounding it. …
How building a world class SOC can alleviate security team burnout
For security leaders, building a mature Security Operations Center is about establishing robust processes that bring teams and technology together for success. Yet many SOC …
BehavioSec extends its behavioral biometrics platform into a SOC/ISO compliant SaaS version
BehavioSec announced that it has extended its patented technology and BehavioSense platform into a SOC/ISO compliant, hosted-version and a cloud-native, SaaS version. These …
Box Sign delivers unlimited signatures to customers at no additional cost
Box began rolling out Box Sign, its native e-signature capability, to customers on Business and Enterprise plans at no additional cost. With this launch, Box Sign delivers …
XDR: Security’s new frontier
As enterprises transform their IT environment and workforce, finding the right security approach is critical for success. Without the proper protective measures in place, …
SOC burnout is real: 3 preventative steps every CISO must take
Consider this scenario: Morgan, a level 3 security analyst, arrives to a twelve-hour security operations center (SOC) shift and finds a message that a network sensor is …
How do I select a virtual SOC solution for my business?
Other than a traditional SOC (security operations center) model, which offers continuous system monitoring to improve an organization’s security posture, there is also a …
The human cost of understaffed SOCs
SOC and IT security teams are suffering from high levels of stress outside of the working day – with alert overload a prime culprit, a Trend Micro study reveals. …
Sophos XDR: Threat hunting through the entire security ecosystem
Almost a decade ago, ransomware started becoming a prominent consumer problem, locking computers and threatening users with fines and jail time for supposedly downloading …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments