New & Notable
Security automation systems, tools and tactics News
February 19, 2019
Palo Alto Networks announced its plan of acquiring SOAR vendor Demisto for $560 million to accelerate its Application Framework strategy and beef up security operations automation.
January 16, 2019
Security experts sound off on the importance and benefits of automating security, and highlight factors to be considered before implementing SOAR tools.
November 15, 2018
During the Securing the Enterprise conference at MIT's CSAIL, BT Security CEO Mark Hughes discusses the benefits and challenges red teaming has presented to his company.
April 27, 2018
In part two of the interview with SentinelOne CEO Tomer Weingarten, he discusses how niche products and venture capital investments have affected the endpoint security space.
Security automation systems, tools and tactics Get Started
Bring yourself up to speed with our introductory content
SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network. Continue Reading
A honeypot is a network-attached system set up as a decoy to lure cyberattackers and to detect, deflect or study hacking attempts in order to gain unauthorized access to information systems. Continue Reading
Wondering where to apply automation to incident response in order to achieve the best results? The variety of options might be greater than you imagine. Read on to learn more. Continue Reading
Evaluate Security automation systems, tools and tactics Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The latest SIEM tools are upping the ante with AI and machine learning capabilities. But, while SIEM security is changing fast you're still going to need the human touch. Continue Reading
The enterprise SIEM is still essential to IT defenses, but the addition of AI, in the form of machine learning capabilities, gives it even more potential power. Continue Reading
IR is shifting, with new technology, automation, machine learning and third-party services changing how IR is performed. But in-house security will remain central. Continue Reading
Manage Security automation systems, tools and tactics
Learn to apply best practices and optimize your operations.
Is your SIEM ready to face the future? Or is it time for a major tune-up or at least some tweaks around the edges? Learn how to approach your SIEM assessment and updates. Continue Reading
Unfortunately for enterprises, IPv4 and IPv6 policies don't always agree. Fernando Gont examines the differences between these two security policies, as well as some filtering rules. Continue Reading
The use of security automation and orchestration systems is on the rise, as they have the ability to provide automatic responses to threats. Learn how this benefits the enterprise. Continue Reading
Problem Solve Security automation systems, tools and tactics Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Security automation tools help ease the deluge of alerts security teams receive, according to IEEE member Kayne McGladrey, letting them focus on more interesting aspects of IT security. Continue Reading
Automated tools are making it easier for citizen developers to build and deploy applications quickly. But is that a good thing for enterprise security teams? Continue Reading