When Alex Rombak first interviewed for a role as a technical support engineer with IBM Trusteer, he seemed a little different to the others in the room. They were all IT experts straight out of the army — some had even been working in technical support for years. Alex’s background,…
Read More
Incident response (IR) automation and orchestration is crucial to operationalizing cybersecurity, giving overburdened security professionals relief by streamlining processes, maximizing the efficiency of their resources and increasing their organization’s overall security posture. As the volume of security alerts skyrockets and the skills gap widens, security teams are rapidly implementing IR…
Read More
The mobile threat landscape is a dynamic ecosystem in perpetual motion. Cybercriminals are constantly renewing their attack techniques to access valuable data, challenging the capabilities of traditional mobile security solutions. Mobile threat defense technology was conceived to tackle the onslaught of cyberthreats targeting enterprise mobility that standard security solutions have…
Read More
The growing demand for increased business agility and cost reductions in relation to IT infrastructure and applications is not a new agenda item for C-level executives. It has, however, remained a priority topic in 2018. Compliance with various regulations and cloud security requirements has expanded as technology and cloud uptake…
Read More