We are currently seeing a trend toward the adoption of security orchestration, automation, and response (SOAR) tools that shouldn't waver in the coming years. Research firm Gartner who coined the term has predicted that by the end of 2022 30% of organizations with security teams larger than five people will make SOAR tools part of their operations. more
For several years, digital security relied on a simple strategy – gain insight from past events, learn from them, and base security protection accordingly. more
The Global Commission on the Stability of Cyberspace (GCSC) has presented its "Advancing Cyberstability" report at the Paris Peace Forum. The report is the culmination of the Commission's multi-stakeholder efforts over the past three years to offer – at a critical juncture in the future of cyberspace – a framework for cyber stability, norms of cyber-behavior for state and non-state actors, and recommendations for enhancing stability. more
One of the main struggles of organizations is streamlining processes through cost-effective means. This problem is adequately addressed by DevOps, a set of processes that aims to unify development and operations. more
The traditional notion of the security perimeter is growing increasingly problematic in the wake of highly publicized attacks. The perimeter is becoming nonexistent, as cloud-based infrastructures replace legacy systems. more
While it's true that the lines between cybersecurity roles have become blurred, some have more significant barriers to entry. The field of digital forensics and incident response (DFIR), in particular, is an altogether different beast. more
Achieving an ideal organizational network means seamless development, operations, and security. Knowing and achieving that, however, is a great challenge. more
Mitigation and remediation are two words thrown around a lot in cybersecurity, often, interchangeably. While there exists a stark contrast between one and the other, both play a crucial role in security service providers' risk-related decisions. more
Following a recent contract renewal, Neustar and .CLUB Domains are happy to announce a four-year extension of our longstanding, successful partnership. This means Neustar will remain the exclusive Registry Service Provider for the .CLUB TLD until at least 2023. more
Emerging malicious threats are driving the demand for new cybersecurity experts. The rise of ransomware and machine learning (ML)-driven attacks underscores the importance of having the capability to track and prepare to combat such threats. In response, the profession had to adapt quickly by employing staff with the necessary offensive and defensive skills. more
Cloud-based technologies are effective means to gain visibility into the IT challenges faced by organizations. Adopting them enabled infrastructure-as-a-service (IaaS) providers to increase client uptime, security, and compliance, all the while giving more flexibility to scale up or down to respond to opportunities and challenges on time. more
News of a South African ISP's two-day outage sent the industry abuzz last month, highlighting the need for improved distributed denial-of-service (DDoS) attack mitigation. more
Sponsored byWhoisXML API
Sponsored byCSC
Sponsored byIPv4.Global
Sponsored byDNIB.com
Sponsored byRadix
Sponsored byVerisign
Sponsored byVerisign