New & Notable
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Security automation systems, tools and tactics News
April 17, 2018
Matt Goodrich, director for the Federal Risk and Authorization Management Program, detailed FedRAMP security requirements and automation at RSA's Cloud Security Alliance Summit.
April 16, 2018
A new key and certificate management service is now offered by SSH, which teamed up with AppViewX to provide a way to administer cryptographic keys and digital certificates.
June 09, 2017
News roundup: Kaspersky files a complaint against Microsoft's handling of independent antivirus software for Windows 10. Plus, hackers use Instagram to spread malware, and more.
April 21, 2017
Juniper's Kevin Walker talks with SearchSecurity about his company's Software-Defined Secure Network platform, improving SDN security, and the evolution of machine learning.
Security automation systems, tools and tactics Get Started
Bring yourself up to speed with our introductory content
Automation is essential to keep up with the speed and potential lethality of threats now. Does automatic feel problematic? Then try to focus on security fundamentals. Continue Reading
Information security operations centers are “growing up,” according to one study. But, with staffing shortages and manual collection of data, performance metrics are hard to get. Continue Reading
Cognitive security is the application of AI technologies patterned on human thought processes to detect threats and protect physical and digital systems. Continue Reading
Evaluate Security automation systems, tools and tactics Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
VMware AppDefense is an endpoint security tool that relies on security automation to determine the intended state of a VM and to analyze and identify unusual application behavior. Continue Reading
In this excerpt from chapter six of Research Methods for Cyber Security, authors Thomas W. Edgar and David O. Manz discuss the different types of machine learning. Continue Reading
Manage Security automation systems, tools and tactics
Learn to apply best practices and optimize your operations.
Battling threats in today's fast-paced cyberworld means shutting down vulnerabilities fast, which requires round-the-clock monitoring. Learn how to make it happen in your company. Continue Reading
From creating an inventory to scanning for IoT vulnerabilities, learn the key steps to take when it comes to automating patch management in your company. Continue Reading
SOCs are maturing, but organizations facing the increased threat landscape understand that improving their effectiveness must be a priority in the year ahead. Continue Reading
Problem Solve Security automation systems, tools and tactics Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Automated tools are making it easier for citizen developers to build and deploy applications quickly. But is that a good thing for enterprise security teams? Continue Reading