Cybersecurity

Sponsored
by

Cybersecurity / Industry Updates

Is Your Organization Mature Enough for Security Orchestration, Automation, and Response?

We are currently seeing a trend toward the adoption of security orchestration, automation, and response (SOAR) tools that shouldn't waver in the coming years. Research firm Gartner who coined the term has predicted that by the end of 2022 30% of organizations with security teams larger than five people will make SOAR tools part of their operations. more

Can Security Analytics Combat Digital Fraud with IP and Domain Name Monitoring?

For several years, digital security relied on a simple strategy – gain insight from past events, learn from them, and base security protection accordingly. more

Afilias Endorses Global Commission on the Stability of Cyberspace Final Report at Paris Peace Forum

The Global Commission on the Stability of Cyberspace (GCSC) has presented its "Advancing Cyberstability" report at the Paris Peace Forum. The report is the culmination of the Commission's multi-stakeholder efforts over the past three years to offer – at a critical juncture in the future of cyberspace – a framework for cyber stability, norms of cyber-behavior for state and non-state actors, and recommendations for enhancing stability. more

Moving from the Castle-and-Moat to the Zero-Trust Model

The traditional notion of the security perimeter is growing increasingly problematic in the wake of highly publicized attacks. The perimeter is becoming nonexistent, as cloud-based infrastructures replace legacy systems. more

What to Look for in Digital Forensics and Incident Response Experts

While it's true that the lines between cybersecurity roles have become blurred, some have more significant barriers to entry. The field of digital forensics and incident response (DFIR), in particular, is an altogether different beast. more

Why IT Security and DevOps Teams Are Often at Odds

Achieving an ideal organizational network means seamless development, operations, and security. Knowing and achieving that, however, is a great challenge. more

Mitigation and Remediation: Where Threat Intelligence Fits In

Mitigation and remediation are two words thrown around a lot in cybersecurity, often, interchangeably. While there exists a stark contrast between one and the other, both play a crucial role in security service providers' risk-related decisions. more

4 Cybersecurity Jobs Created in Response to Evolving Threats

Emerging malicious threats are driving the demand for new cybersecurity experts. The rise of ransomware and machine learning (ML)-driven attacks underscores the importance of having the capability to track and prepare to combat such threats. In response, the profession had to adapt quickly by employing staff with the necessary offensive and defensive skills. more

How Threat Intelligence Prevents Nameserver Takeovers and Their Far-Reaching Damage

In an ideal world, administrators should never run across threats to their web properties. However, human errors and vulnerabilities inevitably get in the way of cybersafety. Managed Domain Name System (DNS) providers, registrars, and services can sometimes put users at immense risk as well. more

Can Network and Threat Data Correlation Improve SIEM Solutions?

More and more businesses contend with rising cybersecurity threats. The mounting numbers are pressuring managed service providers (MSPs) to employ sophisticated tools to secure each of their client's systems, network architectures, and confidential information. more