Tag: Security Services
-
Assessing Security Operation Centers Using a Balanced Scorecard
Measuring the effectiveness of a security operations center (SOC) can be a daunting task, but a balanced scorecard approach can make the …
-
Data Security by the Numbers: How a Smarter Approach Saves Time and Money
It’s well-known in business that you need to balance money spent versus money saved. The most effective, cost-cutting data security …
-
Sailing in the Sea of IoT
It’s the kind of story many of us grew up hearing: “Someday, your fridge will know what you need from the store before you do.” We …
-
WannaCry: How the Widespread Ransomware Changed Cybersecurity
If I had polled cybersecurity experts on their way to work on May 12, 2017, most of them would have said they knew a major cybersecurity …
-
Cybersecurity Strategy: Building Trust on Shifting Sands
the enterprise for digital business requires a change in technology, process and culture. Along with this comes necessary changes on a …
-
What’s New in 2020: Gartner Market Guide for SOAR Solutions
environment burdened by too many tools, a shortage of skilled staff and an increasing number of cyberattacks, automation benefits that help …
-
Ensuring Your Security Operations Center is Ready for Operational Technology
mission of the security operations center (SOC) has evolved over the years. Building a security operations center used to involve …
-
Supply Chain Risks in Healthcare: Time to Increase Security
Knowing the risks and digital defenses are more important than ever in the medical industry, particularly in the case of cybersecurity supply chain risks. …
-
Training Trainers: How IBM Uses Data Breach Simulations to Build Real-World Competency
Threat intelligence and response teams need to be ready to respond to an increasing barrage of risks and changes. To be exact, this is …
-
Crisis and an Incontestable Need for Security — A Business Viewpoint
Data, data, data. We have plenty of it, and in the eyes of some, it’s considered too much of a good …
-
Web Application Security Best Practices: A Developer’s Guide
Digital adoption is only increasing in today’s world. It brings with it the challenges of safeguarding financial and personal data …
-
Why a Security Maturity Model Can Transform How You Use Analytics
The core idea of a maturity model is to identify the current standing of security operations, as well as to determine what the next stage …
●●●