Evaluate
Weigh the pros and cons of technologies, products and projects you are considering.
Security automation systems tools and tactics
Role of AI in cybersecurity and 6 possible product options
Cyberthreats loom large in this modern IT environment. Explore the six most common roles of AI in cybersecurity and the products synthesizing them. Continue Reading
The top 3 use cases for AI endpoint security tools
Endpoint attack surfaces are growing, and cybersecurity pros struggle to keep up. Consider the following use cases for AI endpoint security techniques in the enterprise. Continue Reading
Do I need to adopt a cybersecurity framework?
A comprehensive cybersecurity framework can help businesses avoid costly attacks. But there are other advantages. Continue Reading
-
SOAR vs. SIEM: What's the difference?
When it comes to the SOAR vs. SIEM debate, it's important to understand their fundamental differences to get the most benefit from your security data. Continue Reading
Can a zero-trust approach fill the security perimeter void?
With the enterprise perimeter a mere memory, how can enterprises hope to secure their mission-critical data and systems? Continue Reading
Microsegmentation security: Your key to zero trust
Zero trust is the path forward to secure corporate IT assets. Learn how to put into place a zero-trust security model with a microsegmentation strategy.Continue Reading
SIEM tools, future tech and how to prepare for what's ahead
The latest SIEM tools are upping the ante with AI and machine learning capabilities. But, while SIEM security is changing fast you're still going to need the human touch.Continue Reading
Give your SIEM system a power boost with machine learning
The enterprise SIEM is still essential to IT defenses, but the addition of AI, in the form of machine learning capabilities, gives it even more potential power.Continue Reading
Incident response playbook in flux as services, tools arrive
IR is shifting, with new technology, automation, machine learning and third-party services changing how IR is performed. But in-house security will remain central.Continue Reading
How to integrate an incident response service provider
Adding a third-party incident response service to your cybersecurity program can bulk up enterprise defenses, but the provider must be integrated carefully to reap the benefits.Continue Reading
-
The time is ripe to implement cybersecurity automation
Automation is essential to keep up with the speed and potential lethality of threats now. Does automatic feel problematic? Then try to focus on security fundamentals.Continue Reading
Research Methods for Cyber Security
In this excerpt from chapter six of Research Methods for Cyber Security, authors Thomas W. Edgar and David O. Manz discuss the different types of machine learning.Continue Reading