Leverage Automation Successfully as Part of a Broader SOAR Strategy

In a previous article, we explored common misconceptions about automation and the realities of using automation to improve security. This article discusses automation best practices as part of an overall Security Orchestration, Automation and Response (SOAR) strategy. Being fully aware of the pitfalls of automation helps frame best practices and…

Read More

Cybersecurity Operations: 5 Ways to Cut Costs Without Pain

Cybersecurity frameworks are notoriously expensive to build and maintain. And, business leaders are frequently dissatisfied with their effectiveness. According to research conducted by the Ponemon Institute, enterprises spend an average of $2.86 million per year on their in-house security operations center (SOC), with more than half of those costs allocated to…

Read More

How Can Enterprises Protect Personally Identifiable Information?

With data breaches often appearing in the news, customers and enterprise leaders alike may be concerned that the enterprise isn’t doing enough to protect customers’ personally identifiable infomation (PII). As today’s chaotic economy makes for a hungry threat landscape, what methods can the enterprise apply to better protect the increased…

Read More