Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source – subscribe here!

Please turn on your JavaScript for this page to function normally.
data
The rise of modern applications, DevSecOps and the intelligence economy

There has been a significant year-over-year growth in enterprise usage trends around multi-cloud adoption, open source technologies such as Kubernetes, and AWS cloud-native …

arrows
The persistent struggle to improve SOC productivity reveals the need for newer SIEM technologies

On average, security personnel in U.S. enterprises waste approximately 25 percent of their time chasing false positives because security alerts or indicators of compromise …

binary
Your backup data sets can become a treasure trove for advanced threat detection

Despite ever increasing investments in security technologies, data breaches and cyber incidents are increasing at a relentless rate, and the problem is projected to keep …

abstract
Are SMBs driving the adoption of security automation by enterprises?

If you tracked the lifecycle of new security technologies, you’d likely see that most start as enterprise solutions and eventually trickle down to small and medium-sized …

evil
The evil of vanity metrics

With the fast-paced evolution of tools and connectedness in business operations, the amount of network and log data has exploded. However, organizations have largely failed to …

road sign
Is this the year SIEM goes over the cliff?

While this may not be the year that Security Information and Event Management (SIEM) solutions fall off of the cliff of relevancy into obsolete software land, they are slowly …

binary
Getting the most out of your SIEM investment

Over the last 10-15 years, many organizations built Security Operations Centers (SOCs) on the backbone of security information and event management (SIEM) solutions. These …

idea
5 incident response practices that keep enterprises from adapting to new threats

Security analysts within enterprises are living a nightmare that never ends. 24 hours a day, their organizations are being attacked by outside (and sometimes inside) …

architecture
3 sour notes interrupting security operations harmony

Great musicians and instruments alone do not make beautiful music. It is the conductor who leads the orchestra and turns the collection of sounds into perfectly executed …

Money
Worldwide infosec spending to reach $90 billion in 2017

Enterprises are transforming their security spending strategy in 2017, moving away from prevention-only approaches to focus more on detection and response, according to …

brain
Integrating threat intelligence with existing security technologies

70 percent of security industry professionals believe threat intelligence is often too voluminous and/or complex to provide actionable insights. Perceptions about the …

money
Worldwide infosec spending to reach $81.6 billion in 2016

Worldwide spending on information security products and services will reach $81.6 billion in 2016, an increase of 7.9 percent over 2015, according to the latest forecast from …

Don't miss

Cybersecurity news