member sign-in
Forgot password? Create new account Close
For Unified Content Security
HP Security Research - Cyber Risk Report 2015
Programul Operaţional Sectorial „Creşterea Competitivităţii Economice”
Put A Security Lining In Your Cloud
SECURE THE BREACH IN THREE STEPS
  • Support, Enforce and Measure Processes Support, Enforce and Measure Processes

    In the 2016 State of Security Operations Report, the 4 elements of security operations capability can be broken down into assessment categories that are used in the HPE maturity assessments. .         The technology in a SOC should support, enforce, and measure the processes that are being executed. Technology does not provide value independent of people and process, and any implementation of technology in a SOC needs to have the necessary ecosystem in which to produce ROI. In the 2016 State of Security Operations report, when assessing the elements of technology, we evaluated elements ranging from architectural process and documentation, to dashboards and reporting. Findings include: Organizations that deploy tools, which push incident identification and remediation closer to the first-line analysts, will save money. An example is a right-click integration with a firewall from a SIEM console that allows an analyst to put a temporary block on a suspicious or malicious IP. This allows less-expensive resources to remediate incidents, [...]

    Read more ...
  • Landmark Cybersecurity Proposals from White House on Workforce Development and Privacy Landmark Cybersecurity Proposals from White House on Workforce Development and Privacy

    It’s great to see the White House leaning forward and taking action to improve our national Cyber Security posture by announcing a Cybersecurity National Action Plan (CNAP) and issuing an Executive Order to create a permanent Federal Privacy Council. Both initiatives will improve the national [...]

    Read more ...
  • Second Screens Not Enough to Stop Internet Traffic Plunge During Super Bowl
    Second Screens Not Enough to Stop Internet Traffic Plunge During Super Bowl

    On Sunday, February 7, when Super Bowl 50 was on, Internet traffic dipped significantly [...]

    Read more ...
  • The Denver Broncos Know How to Address IT's Biggest Challenge
    The Denver Broncos Know How to Address IT's Biggest Challenge

    It's a college football legend, Paul (Bear) Bryant, who is credited with the adage so [...]

    Read more ...
  • A Legislative Milestone Of the Digital Age
    A Legislative Milestone Of the Digital Age

    With the approved text now available for the new General Data Protection Regulation (GDPR), organisations must [...]

    Read more ...
  • How Secure Do You Want To Be?
    How Secure Do You Want To Be?

    Protecting against advanced cyber-attacks requires, among other things, that you meet the same level of sophistication as [...]

    Read more ...
  • A Leader – THIRD Time in a Row!
    A Leader – THIRD Time in a Row!

    SteelCentral Magic Quadrant Leadership has become a Riverbed tradition, especially in the NPM category. Since the [...]

    Read more ...
  • SSL Attacks on the Rise
    SSL Attacks on the Rise

    As organizations continue to adopt Secure Socket Layer (SSL) protocol as the standard for securing communications, cyber-attackers [...]

    Read more ...