Security News

Rules automation puts the “Sec” in DevSecOps
2018-07-09 12:00

Imagine if safety were an afterthought in automobiles: Manufacturers would create a pristine new car and then hand it off to the safety team…which would bolt airbags onto the dashboard, seatbelts...

'Lazy' Hacking: Attack Automation Continues to Increase
2018-07-02 17:48

But No Signs Hackers Yet Have AI, Says Cybereason's Ross RusticiSecurity experts warn that hackers could one day make use of machine learning and AI to make their attacks more effective....

Enterprise digital transformation and IT automation with NS1’s Private DNS
2018-06-29 12:28

NS1 unveiled Private DNS, an enterprise solution that unlocks the infrastructure performance, automation and scale advantages already used by the Internet companies. Private DNS is for...

Endpoint security automation a top priority for IT pros
2018-06-21 11:30

A new SANS Institute report found that automating endpoint detection and response processes is the top priority for IT professionals trying to put actionable controls around their endpoints....

Critical Flaws Patched in Schneider Building Automation Software
2018-06-15 05:44

Schneider Electric recently patched four vulnerabilities in its U.motion Builder software, including two critical command execution flaws. Advisories have been published by both the vendor and...

Cisco Live 2018: How Tufin's automation solutions and expanded Cisco partnership simplifies security policy management
2018-06-12 23:47

Joe Schreiber, technical director at Tufin, explains how their change automation solution simplifies security policy management and discusses how they are expanding support for Cisco ASA and FirePOWER.

Five Strategies for Extending Automation and Orchestration Beyond the SOC
2018-06-08 11:07

Automation and Orchestration Are More Than Just the Latest Security Buzzwords read more

How to use Google automation tools to avoid accidental data exposure
2018-06-06 15:33

Scott Ellis, product manager of Google Cloud Platform, shared proactive steps users can take to prevent data stored on Google's infrastructure from falling into the wrong hands.

SOC Automation: Good or Evil?
2018-05-24 07:26

The need for SOC automation is increasing in urgency since adversaries are also harnessing software and hardware to develop and carry out attacks.

Week in review: ATM attacks, security automation, hacking for fun and profit
2018-05-14 02:22

Here’s an overview of some of last week’s most interesting news and articles: iOS users are 18x more likely to be phished than to download malware Phishing is the number one mobile threat...