Preparing for Zero-Day Attacks
Are you one of the 42% of organizations that reported an attack on their hybrid environment in the last year? Discover how you can detect and instantly disrupt attacks in the production environment before they take hold.
Detecting Meltdown and Spectre
The Meltdown and Spectre vulnerabilities are wreaking havoc on the tech industry and loudly sounding an alarm that even complex, modern processors are still susceptible to big time vulnerabilities. One of the most important outcomes of this frenzy is the broadening of the conversation beyond mitigation and forcing companies critically about detection as part of their […]
Why Container Security is Such a Challenge
Container Security Why Container Security is such a Challenge The Power of Containers Containers are having a moment. They are revolutionizing the way we do application development, but, as with most new technologies, their adoption in the enterprise is (rightfully) hindered by genuine security concerns. Ultimately, containers can bring huge security benefits not found in […]
Making Security Operations Scale
As cyber threats continue to escalate, organizations and governments alike are facing the most critical workforce shortage of our time. The current number of experienced cybersecurity professionals is not nearly enough to satisfy the insatiable hiring demands required to keep our societies safe. We are woefully short-handed in defending against increasingly sophisticated threats. To meet […]
Nine Reasons Why the Death of the Security Appliance Is Inevitable
Most security organizations are used to appliances being the workhorse for their protection needs. Indeed, the major security vendors today tend to have huge appliance businesses, including the old titans (e.g., Symantec and McAfee) and the new titans (e.g., Palo Alto and FireEye). As crucial as security appliances are today, they are eventually going to die […]
Time to Blow Up the SOC?
Thirty-seven percent of SOCs faced more than 10,000 alerts per day and more than half of those were false positives, which can easily cost organizations thousands of wasted hour and millions of wasted dollars every year. Realistically, many “true positives” are for events with incredibly low value, such as reconnaissance scans. Most scans don’t turn […]
Time to Sock the SOC?
Your Security Operations Center (SOC) is barraged with so many alerts that your team may be shell shocked into believing that they are under a constant and unmanageable assault. Indeed, they are under siege – from a constant barrage of data. Alert fatigue is not just some industry buzz phrase – it’s a very real […]