Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Minimizing The Risk of Cyber Attacks with Network Security Analytics

Cyber attacks come in many forms, but they almost always share one trait in common: they are carried out over the network. Although there are exceptions, the network is usually the entry point that attackers use to launch whichever exploits, data thefts, or other intrusions they aim to impose upon a business.

Technology Professionals in Short Supply - 3 Tips to Retain Yours

In an article posted on the organization’s website, the Center for Strategic and International Studies (CISI.org) reported that, as of January 2019, the United States had 314,000 more available cybersecurity positions than it had trained professionals available to fill them. That was an increase of over 50% since 2015.

Former Symantec and Malwarebytes Executive Joins Corelight as Senior Vice President of Product

Corelight, provider of the industry's first open network detection and response (NDR) platform, welcomes Clint Sand as its new senior vice president of product. In this role, Sand will be responsible for all aspects of the Corelight product portfolio, including product management, product design, roadmap, and strategy.

What are the Types of Risk Assessments and When to Use Them?

Creating a cyber-resilient organization means understanding your security risks and how to mitigate them. However, the cybersecurity risk’s continuously shifting nature makes it challenging for organizations to choose the right risk assessment strategy. By understanding the types of risk assessments and how to use them, you can make better-informed decisions.

Securing Amazon EKS Anywhere with Sysdig

Amazon EKS Anywhere is a new deployment option for Amazon Elastic Kubernetes Service that lets you create and operate Kubernetes clusters on-premises. With it, you can run containerized workloads in whatever location best serves your business. Carefully considering what’s needed for security will help you reduce risk and safeguard against potential threats.

How to Implement Cybersecurity Automation in SecOps With SOAR (7 Simple Steps)

When it comes to cybersecurity automation, there is the persistent fear that security automation is here to replace humans. And while those fears are somewhat justified, the reality is that automation in security operations is meant to aid, not hinder security professionals. And with cyber threats evolving at a dazzling rate, cybersecurity automation is slowly becoming a necessity, rather than a luxury.

Expert Advice on Starting a Career in Cybersecurity

Do you have what it takes to become a cybersecurity expert? We interviewed 3 security professionals to find out how they got their start and what advice they would give to someone starting their career in cybersecurity. With security threats increasing, much of business continuity has come to rely on data security. In particular, engineering teams building cloud software rely on access to an ever-growing number of computing resources.