Sumo Logic
eSentire launches integrated MDR and SIEM platform for threat visibility and response
eSentire announced a partnership with Sumo Logic. This partnership will allow eSentire to deliver the MDR platform that offers full spectrum detection and response …

George Gerchow, CSO at Sumo Logic: Our DevSecOps strategy
Sumo Logic was founded in 2010 by experts in log management, scalable systems, big data, and security. Today, their purpose-built, cloud-native service analyzes more than 100 …

Sumo Logic: What can you learn from our approach to GDPR?
Sumo Logic was founded in 2010 by experts in log management, scalable systems, big data, and security. Today, their purpose-built, cloud-native service analyzes more than 100 …

The modern CSO: Future-proofing your organization in a disruptive world
“There are three essential skill sets a modern day CSO must have. The first is knowledge of the business to better align a security strategy to company objectives …

Photo gallery: Infosecurity Europe 2018 Expo
Infosecurity Europe 2018 is underway at Olympia, London. Here are a few photos from the expo floor. Featured companies: Qualys, Barracuda Networks, ECSC Group, Forcepoint, Pen …

Organizations are uncovering a cloud security paradox
The characteristics of modern applications in the cloud are changing, requiring software and IT architects to shift priorities. Businesses of all sizes are transforming in …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility