Tag: Automation
-
Beating the Cost, Time, and Quality Equation With OWASP ZAP Automation
Want to learn how to beat the cost, time, and quality equation of your project? Check out this post on solving these problems with OWASP ZAP Automation. …
-
Rapid7 Looks to SOAR with InsightConnect Automation Platform
Building on technology gained via the 2017 acquisition of Komand, Rapid7 is now rolling out new security orchestration and automation …
-
Why humans are necessary to the threat hunting process
For thousands of years, humans have worked to collect intelligence on their enemies. Intelligence gathering is not a new practice; in fact, …
-
How to create a Hall of Fame caliber cybersecurity playbook
Whether the sport is football, basketball or hockey, all the best coaches have playbooks and reports with the latest information on …
-
Data privacy automation: Unlock your most valuable asset
In years past, data privacy was the purview of the chief privacy officer. However, increasingly, CTOs are being tasked with …
-
The Future of Security
To gather insights on the current and future state of security, we talked to 47 executives from 43 companies about security in their own …
-
Security Orchestration, Automation and Response Demand Set to Grow
Among the new security acronyms that have emerged in recent years is the term SOAR, which stands for Security Orchestration, Automation and …
-
Security teams turn to automation to tackle avalanche of alerts
High numbers of alerts and the resources needed to deal with them are causing problems for security teams and leading them to turn to …
-
There are no real shortcuts to most security problems
For Xerox Chief Information Security Officer Dr. Alissa Johnson, human ingenuity, partnerships and automation are the answer to most security problems the company has encountered and might yet encounter. …
-
Why Automation Will Free Security Pros to Do What They Do Best
People are and will always be the most critical cybersecurity resource. Right now, the talent pool with the unique skills and training to …
-
Incorporating sensitive asset data into your vulnerability and compliance program
In this podcast recorded at Black Hat USA 2018, Tim White, Director of Product Management, Policy Compliance at Qualys, talks about the …
-
Test Before You Patch
For ERP administrators today, security is always on their mind. But, recent warnings from the US Department of Homeland Security about ERP …
●●●