Blog
How Artificial Intelligence Is Changing Cyber Security Landscape and Preventing Cyber Attacks
September 14, 2019
0 Comment
By Remesh Ramachandran
The world is going digital at an unprecedentedly fast pace, and the change is only going to go even faster. The digitalization means everything is moving at lightning speed – business, entertainment, trends, new products, etc. The consumer gets what he or she wants instantly because the service provider has
SOAPA vs. SOAR: How these security terms differ
September 13, 2019
0 Comment
By Jon Oltsik
SOAPA and SOAR look the same, but the terms are vastly different. Security orchestration, automation, and response (SOAR) tools represent a component of a security operations and analytics platform architecture (SOAPA). I came up with the security operations and analytics platform architecture (SOAPA) concept in late 2016. As a review,
Balancing innovation and security in digital transformation
September 12, 2019
0 Comment
By Stuart Reed
Businesses everywhere are undergoing digital transformation. Widespread adoption of mobile and cloud platforms, along with recent advances in technologies such as AI, blockchain and quantum computing are reshaping how we work. But the increased opportunities these developments represent are accompanied by a growing number of threats to our security. In
Dual-defense strategy for network security
September 12, 2019
0 Comment
By MICHAEL MURRAY
Recent headlines about ransomware attacks have elevated the urgency for public entities to implement effective measures to prevent cybersecurity breaches and avoid becoming the next news story. Government agencies, however, face unique challenges. They are often coping with limited technology budgets, poor cyber hygiene (including outdated and unpatched systems), a
Flipping a coin on cybersecurity?
September 12, 2019
0 Comment
By PAUL STAFFORD
Would you gamble flipping a coin for the effectiveness of your cybersecurity plan? Heads: you’re able to prevent – or recover from – a cyberattack. Tails: you fall victim to a cybercriminal, lose critical business data, suffer immense business productivity and reputational losses — not to mention struggle to recover