Blog

  • The Evolution of Security Automation

    This moderated panel will explore the evolution and future of security automation as it continues to mature and become more widely adopted by modern digital enterprises. Topics covered will include applications of machine learning that accelerate positive security outcomes, the adoption and utility of risk-based decision models in the real world, the relevance of event-driven solutions for security automation to overarching modern digital transformation, and applicability of knowledge management to security automation’s future.

    Moderator:
    – JP Bourget, Founder and Chief Security Officer, Syncurity

    Panelists:
    – Adam Vincent, CEO and Co-Founder, ThreatConnect
    – Bruce Potter, Chief Information Security Officer, Expel
    – Kim Watson, IACD Technical Director, JHU/APL

  • ServiceNow SOAR Integrations Now Available

    As the SOAR market shifts from early adopters to the early majority, a familiar trend toward ease of use has emerged that’s reminiscent of the enterprise server market two decades ago.

  • 3 Scariest Things About Your Security Program

    Halloween is a uniquely American tradition of scary movies, costumes, parties and of course, the candy-crazed-trick-or-treaters. While you binge watch the new Netflix series, “The Haunting of Hill House,” and answer the doorbell to hand out handfuls of sugar-infused treats, it might be worth thinking about the really scary risks lurking in your Security Program.

  • Three Reasons SOAR is Needed to Secure Healthcare IoT Medical Devices

    In his published research, “Evolving IoT Security Risks Demand New Approaches from Healthcare Delivery Organizations,” ID G00355342, Gartner Analyst, Gregg Pessin, provides key insights into the profound impact Internet of Things (IoT) medical devices have on security along with recommendations to address the growing risk.

  • How Security Automation Can Reduce Patch Management Cycle Time And Risk

    Ask any Security or IT professional and they will tell you that patch management is a never-ending process of identifying and remediating ongoing vulnerabilities that often lead to security breaches. Spectre and Meltdown are prime examples of recent vulnerabilities that have severely impacted the Healthcare industry,

  • Top 3 Surprises from RSA 2018

    Like most of the Security world, we’re fighting off the post-RSA backlog, with a renewed enthusiasm for protecting the world’s information as well as the continuing growth of our platform. To say RSA has outgrown itself to become so much more than a conference is an understatement. How many meetings and activities took place outside of RSA this year? And while RSA held true to expectations for many, 3 unexpected themes caught us by surprise.

  • 5 Reasons for “Spring Cleaning” your SOC

    Spring Cleaning. It’s that time of year. Pull the furniture away from the walls, clean out behind the couch and get rid of all the clutter that’s been building up for months. Fun times. But truth be told, most SOCs could use their fair share of Spring Cleaning too. While some state-of-the-art firms have highly-automated Incident Response processes, sophisticated security threat models,

  • Top 3 Barriers to Effective Security Orchestration

    Security Operations orchestration is very top-of-mind for CISOs and their SOC leadership thanks to the ever-increasing complexity and speed of the threat landscape, Splunk’s recent acquisition of Phantom Cyber and Gartner’s formalization of the Security Orchestration, Automation & Response (SOAR) market.