Security News

Joe Schreiber, technical director at Tufin, explains how their change automation solution simplifies security policy management and discusses how they are expanding support for Cisco ASA and FirePOWER.

Automation and Orchestration Are More Than Just the Latest Security Buzzwords read more

Scott Ellis, product manager of Google Cloud Platform, shared proactive steps users can take to prevent data stored on Google's infrastructure from falling into the wrong hands.

The need for SOC automation is increasing in urgency since adversaries are also harnessing software and hardware to develop and carry out attacks.

Here’s an overview of some of last week’s most interesting news and articles: iOS users are 18x more likely to be phished than to download malware Phishing is the number one mobile threat...

Rockwell Automation has released updates for its Arena and FactoryTalk Activation Manager products to address various types of vulnerabilities, including a critical flaw that can allow remote code...

If you tracked the lifecycle of new security technologies, you’d likely see that most start as enterprise solutions and eventually trickle down to small and medium-sized businesses (SMBs). You...

A survey conducted by LogicHub at RSA Conference 2018 identified 79 percent of respondents believe both human expertise and security automation is needed for a powerful security infrastructure to...

CrowdStrike announced at RSA Conference 2018 that it has expanded the capabilities of the CrowdStrike Falcon platform by introducing a new threat analysis subscription module, CrowdStrike Falcon...

Dario Forte of DFLabs on Mitigating the Evolving RisksAgainst today's threat landscape, the security operations center takes on greater importance - and so does the movement to automation. Dario...