#security-operations

[ follow ]
#vulnerability-management
The Hacker News
3 weeks ago
Information security

CTEM in the Spotlight: How Gartner's New Categories Help to Manage Exposures

Gartner's 2024 Hype Cycle emphasizes CTEM's role in managing security exposures effectively. [ more ]
CyberScoop
9 months ago
Information security

Cyber threats change daily. Have your endpoint and vulnerability management capabilities kept pace?

Endpoint and vulnerability management capabilities need to keep pace with daily changing cyber threats.
Lessons from the SolarWinds hack highlight the importance of EDR and vulnerability identification and remediation.
Generating a Software Bill of Materials is critical for security operations. [ more ]
The Hacker News
3 weeks ago
Information security

CTEM in the Spotlight: How Gartner's New Categories Help to Manage Exposures

Gartner's 2024 Hype Cycle emphasizes CTEM's role in managing security exposures effectively. [ more ]
CyberScoop
9 months ago
Information security

Cyber threats change daily. Have your endpoint and vulnerability management capabilities kept pace?

Endpoint and vulnerability management capabilities need to keep pace with daily changing cyber threats.
Lessons from the SolarWinds hack highlight the importance of EDR and vulnerability identification and remediation.
Generating a Software Bill of Materials is critical for security operations. [ more ]
morevulnerability-management
Business Matters
4 weeks ago
Privacy professionals

Insights from Retired U.S. Marshal Andrew Smith: Leadership, Innovation, and Integrity

Andrew Smith dedicated his career to law enforcement, particularly within the U.S. Marshals Service, driven by a commitment to public service and national security. [ more ]
#cybersecurity
App Developer Magazine
1 month ago
Information security

GenAI cybersecurity assistant lands from IBM | App Developer Magazine

IBM introduces generative AI to enhance Threat Detection and Response Services, enabling faster investigations and improved security for clients. [ more ]
DevOps.com
4 months ago
Information security

Hunters Announces Full Adoption of OCSF and Introduces OCSF-Native Search - DevOps.com

Hunters adopts Open Cybersecurity Schema Framework (OCSF) and launches OCSF-native Search capability for improved cybersecurity operations. [ more ]
App Developer Magazine
1 month ago
Information security

GenAI cybersecurity assistant lands from IBM | App Developer Magazine

IBM introduces generative AI to enhance Threat Detection and Response Services, enabling faster investigations and improved security for clients. [ more ]
DevOps.com
4 months ago
Information security

Hunters Announces Full Adoption of OCSF and Introduces OCSF-Native Search - DevOps.com

Hunters adopts Open Cybersecurity Schema Framework (OCSF) and launches OCSF-native Search capability for improved cybersecurity operations. [ more ]
morecybersecurity
The Hacker News
1 month ago
Information security

How To Get the Most From Your Security Team's Email Alert Budget

Security teams need to effectively monitor and respond to threats to combat the rising scale and complexity of phishing attacks in the context of a talent shortage. [ more ]
www.nytimes.com
1 month ago
Digital life

With Long Hours and a No-Fail Mission, the Secret Service Tries to Make Do

The assassination attempt on Donald J. Trump revealed weaknesses in Secret Service security operations, prompting an examination of resource allocation and training procedures. [ more ]
www.npr.org
1 month ago
US news

Mayorkas names panel to conduct review of Trump assassination attempt

An independent panel of experts, including former high-ranking officials, is appointed by Homeland Security Secretary Alejandro Mayorkas to investigate the attempted assassination of former President Donald Trump. [ more ]
The Conversation
2 months ago
Privacy professionals

AI mass surveillance at Paris Olympics - a legal scholar on the security boon and privacy nightmare

Increased surveillance using AI will be a key component of security operations during the 2024 Paris Olympics. [ more ]
www.aljazeera.com
6 months ago
EU data protection

EU launches Red Sea naval mission to protect shipping from Houthi attacks

European Union launches naval mission in Red Sea to protect cargo ships from Yemen's Houthi rebels
Mission involves deployment of European warships and early warning systems to ensure freedom of navigation [ more ]
#security technology market
TechRepublic
9 months ago
Information security

2023 Gartner Market Guide for Security, Orchestration, Automation and Response Solutions

The security technology market is facing challenges with budget, staffing, and having too many point solutions.
Security orchestration, automation, and response (SOAR) can help optimize security operations by automating tasks and strengthening defenses. [ more ]
TechRepublic
9 months ago
Information security

2023 Gartner Market Guide for Security, Orchestration, Automation and Response Solutions

The security technology market is facing challenges with budget, staffing, and having too many point solutions.
Security orchestration, automation, and response (SOAR) can help optimize security operations by automating tasks and strengthening defenses. [ more ]
TechRepublic
9 months ago
Information security

2023 Gartner Market Guide for Security, Orchestration, Automation and Response Solutions

The security technology market is facing challenges with budget, staffing, and having too many point solutions.
Security orchestration, automation, and response (SOAR) can help optimize security operations by automating tasks and strengthening defenses. [ more ]
TechRepublic
9 months ago
Information security

2023 Gartner Market Guide for Security, Orchestration, Automation and Response Solutions

The security technology market is facing challenges with budget, staffing, and having too many point solutions.
Security orchestration, automation, and response (SOAR) can help optimize security operations by automating tasks and strengthening defenses. [ more ]
moresecurity technology market
TechRepublic
9 months ago
Business intelligence

2023 Gartner Market Guide for Security, Orchestration, Automation and Response Solutions

The security technology market is facing challenges with budget, staffing, and having too many point solutions.
Security orchestration, automation, and response (SOAR) can help optimize security operations by automating tasks and strengthening defenses. [ more ]
InfoQ
2 months ago
Tech industry

Microsoft Entra Suite Now Generally Available: Identity and Security Based Upon Zero-Trust Models

Microsoft released Entra Suite focusing on zero-trust security models for unified approach. [ more ]
euronews
3 months ago
Europe news

French and Spanish police hold terror drills before Olympics

The exercise Operation Optimus aimed to enhance response capabilities for combating terrorism. [ more ]
[ Load more ]