automation

For strong unified communications security, behavioral analytics is critical
If there’s one thing security professionals should understand and acknowledge – whether they’re part of an organization’s multi-person IT security team or the CISO guiding …

Most network endpoints are in the dark: Do you know how to find them?
Traditional manual endpoint security approaches are ineffective and resource-intensive, leading to neglect of basic maintenance such as patches and updates, according to …

When AI and security automation become foolish and dangerous
There is a looming fear across all industries that jobs are at risk to artificial intelligence (AI), which can perform those same jobs better and faster than humans. A recent …

McAfee aims to strengthen human-machine defense teams
“Today’s security teams are facing 244 new cyber threats every minute, amid a serious talent shortage. Siloed security, without automation, managed by overwhelmed teams is not …

Defensive AI system implements strategies from the best analysts
Champion Technology Company, developer of DarkLight, an AI expert system for active cyber defense and trusted information sharing, today released their latest technology …

Orchestrating security across multiple environments
In an effort to help organizations centralize their intelligence and security process management, ThreatConnect has expanded its security platform’s capabilities to …

Creating the security operations center of the future with Siemplify
Security operations teams are engaged in a constant struggle to keep up with the volume of security alerts, maintain the right skills, and manage incident response processes. …

Security analytics and operations are becoming more difficult
A new Enterprise Strategy Group (ESG) study, which involved a survey of more than 400 IT and cybersecurity professionals, found that 72 percent feel cybersecurity analytics …

Cybersecurity analytics and operations: Need for automation and orchestration
New research from Enterprise Strategy Group (ESG) shows that when it comes to the evolution of Cybersecurity Analytics and Operations, 71% of respondent organizations find it …

Behavioural profiling: Spotting the signs of cyber attacks and misuse
Behavioural profiling is increasingly recognised as a new level of protection against cyber attacks and systems abuse, offering the potential to pick out new and unknown …

Cybersecurity: To automate or not to automate?
There are seven vital automated IT security applications that will function as the stepping stones necessary to advance cybersecurity in the new world of artificial …

Can you justify your security spend?
In this podcast recorded at RSA Conference 2017, Todd Bramblett, President of Nehemiah Security, talks about why cyber risk has become such a hot topic, the importance of IT …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)