Tag: openDXL

This blog was written by Barbara Kay. Security embodies the analogy of fixing a plane in flight. Every company has some variety of security people, process, and technology in place already. So, like a plane in flight, your security infrastructure needs an operational model that can be updated, adapted, repaired, or serviced while it is ...
Read Blog
Today everyone is talking about security automation. However, what are the right processes and actions to automate safely? What are the right processes and actions to automate that will actually achieve some security outcome, such as improving sec ops efficiency or reducing attacker dwell time? Just look in the latest industry report and you will ...
Read Blog
This blog post was written by Vincent Weafer. It is no secret that the end goal for cybersecurity companies is to battle cyber-threats & cyber-attackers in order keep their customers assets and data safe.  Easy, right? Well, the problem is that defenders must move faster than the attackers, than the changes in the underlying technologies ...
Read Blog
This blog was written by Maneeza Malik. Digital transformation, the rise of mobile banking, ongoing migration of core banking services to the cloud and a shift towards an omni-banking model have all contributed to an overall wider threat landscape for financial institutions to monitor and manage. This is further exacerbated by the fact that financial institutions ...
Read Blog
This blog was written by Barbara Kay. For the last month, my corner of Northern California has endured record-breaking inundation from the skies, leading to mud slides, downed power lines, road closures, and, in my case at least, propane and power outages. It’s been hard to stay productive, stretching the resources of laptops, UPSes, mobile ...
Read Blog
This blog was written by Barbara Kay. A fast-forward button for integration to a unified security architecture. One of the reasons why the Mission Impossible premise has resonated across the generations is that all of us, at one time or another, are handed projects that seem to come with that label. Unfortunately, if you’re like ...
Read Blog
This blog was written by Barbara Kay. Finding new ways to extract more value from security operations is a hot priority for most CISOs and security architects as they progress toward the goal of a proactive and optimized security operation. But according to our research, 26% of security operations centers (SOCs) still operate in reactive ...
Read Blog
En mi última publicación hablé sobre los atributos de nuestros adversarios, los motivos por detrás de sus actividades y las metodologías de ataque recientes. También hablé de la curva de eficacia de la defensa contra amenazas, que ilustra cómo disminuye la eficacia de las capacidades de ciberdefensa a lo largo del tiempo conforme los atacantes ...
Read Blog
Today’s digital world is drastically different than it was 10 years ago.  It is arguably, drastically different than it was 1 year ago.  The migration from on premise solutions to cloud solutions, mobility, IoT, client computing have all evolved to name a few.  The numerous innovations are continually evolving. Those innovations are plaguing security professionals ...
Read Blog