In the near future, self-driving vehicles will likely be the norm. Cars today are essentially just computers with wheels, and they’re becoming increasingly interconnected. This, of course, provides opportunities to make our lives easier, but it can also increase the digital attack surface and potential risks if manufacturers leave proper…
Read More
There are so many delegated operations in any business — finance, legal, physical plant functions, etc. — that any number of them can be easily overlooked. Without checking over every minute detail, the overall business appears to function with minimal involvement. Of course, there are a thousand invisible hands working…
Read More
When Alex Rombak first interviewed for a role as a technical support engineer with IBM Trusteer, he seemed a little different to the others in the room. They were all IT experts straight out of the army — some had even been working in technical support for years. Alex’s background,…
Read More
Incident response (IR) automation and orchestration is crucial to operationalizing cybersecurity, giving overburdened security professionals relief by streamlining processes, maximizing the efficiency of their resources and increasing their organization’s overall security posture. As the volume of security alerts skyrockets and the skills gap widens, security teams are rapidly implementing IR…
Read More