This is the first in a blog series about building and maintaining brand trust. Transforming the enterprise for digital business requires a change in technology, process and culture. Along with this comes necessary changes on a cybersecurity strategy. Like walking on shifting sands, keeping cybersecurity strategy top of mind while…
Read More
Since it is highly unlikely that my wife will read a blog on data security, I think I can safely share that she is a snoop around birthdays, anniversaries and holidays. My wife cannot stand the suspense of not knowing what gift might be in store. The gift’s value is…
Read More
In a security environment burdened by too many tools, a shortage of skilled staff and an increasing number of cyberattacks, automation benefits that help bring efficiency and prioritization to the security operations center (SOC) are primarily delivered through security orchestration, automation and response (SOAR) solutions. Given this, it’s no surprise…
Read More
The mission of the security operations center (SOC) has evolved over the years. Building a security operations center used to involve onboarding as many device feeds as possible. Today, it’s more about having an integrated security information and event management (SIEM) and big data platform — complemented by workflow, automation…
Read More