Security News

Rockwell Automation announced that it has acquired Oylo, a privately-held industrial cybersecurity services provider based in Barcelona, Spain. Oylo is dedicated to providing a broad range of industrial control system cybersecurity services and solutions including assessments, turnkey implementations, managed services and incident response.

What is the difference between a penetration test and a red team exercise? The common understanding is that a red team exercise is a pen-test on steroids, but what does that mean? The first, red team automation, has the obvious advantage of increasing the operational efficiency of a red team.

Accenture announced a new generation of its intelligent automation platform Accenture myWizard, to help organizations unleash the power of automation to improve business agility, customer experience and innovation. Accenture myWizard helps organizations create, implement and measure enterprise-wide automation strategies and reimagine their IT systems for efficiency and performance.

These three components together provide what Cynet calls Autonomous Breach Protection - essentially breach protection on auto-pilot. Cynet automates many tasks associated with threat detection response and cross-environment remediation including infected hosts, compromised user accounts, malicious processes and attacker-controlled network traffic.

These three components together provide what Cynet calls Autonomous Breach Protection - essentially breach protection on auto-pilot. Response Automation Cynet automates many tasks associated with threat detection response and cross-environment remediation, including infected hosts, compromised user accounts, malicious processes, and attacker-controlled network traffic.

Which cybersecurity failures cost companies the most and which defenses have the highest ROI?Massachusetts Institute of Technology scientists have created a cryptographic platform that allows companies to securely share data on cyber attacks they suffered and the monetary cost of their cybersecurity failures without worrying about revealing sensitive information to their competitors or damaging their own reputation. Essential features of security automation for the AWS platformA common security problem in AWS is an open S3 storage bucket where data is publicly readable on the Internet.

Kryon unveils cloud-based Full Cycle Automation-as-a-Service platform powered by Amazon Web Services
Kryon launched the industry's first cloud-based Full Cycle Automation-as-a-Service platform. Powered by Amazon Web Services, Kryon's FCAaaS pushes the boundaries of automation by combining Process Discovery, RPA, and actionable analytics in one unified platform.

Application developers are not security specialists, and likely do not have the knowledge and skills to find and fix security issues in a timely manner. The AWS cloud platform is ripe for security automation.

The operational level is focused on aligning to governance protocols like risk thresholds, delivery timelines, and automation during the build phases of business value creation. The end of the line in any process is where the actual customer that receives the value from a product or service experiences the touchpoint with your portfolio of valued items.

Umpqua Bank released a survey gauging the impact of the COVID-19 pandemic on the confidence and future of U.S.-based small and mid-size businesses. More than 1,200 leaders at companies across all industries and geographic regions were surveyed on how their businesses are responding and what they will need in the months ahead to navigate successfully through a once-in-a-lifetime global pandemic event.