7 Aug 2019 | Enterprise Security, Industry Collaboration and Standards, People and Processes, Research & White Papers, Technology & Solutions
The OpenC2 Forum has approved its first specifications, putting the standard on a footing with which it can scale out into commercial deployments and increase speed and efficiency in cyber security operations.
25 Apr 2019 | Companies, Enterprise Security, Industry Collaboration and Standards, People and Processes, Research & White Papers, The Business of Cyber Security
It’s clear from the proof-points offered up in a recent webcast that IBM Security and Cisco are serious about their cyber security alliance. In the near future, though, the partners will disrupt the cyber security market at the margins rather than transforming...
29 Mar 2019 | Industry Collaboration and Standards, People and Processes, Research & White Papers, Technology & Solutions, The Telecom Sector
ETSI TC Cyber has released a new security standard that allows telcos to run core public telecom services in – wait for it – public clouds. Here’s how it works and what it means for the telecom ecosystem.
4 Mar 2019 | Enterprise Security, Industry Collaboration and Standards, People and Processes, Regulation and Policy, Research & White Papers, Technology & Solutions
AI isn’t a ‘silver bullet’ for cyber security, neither does it need to represent unacceptable risk. Drawing on research into the experience of early adopters, this White Paper provides guidance on what to expect from AI in cyber security..
27 Feb 2019 | Companies, Enterprise Security, People and Processes, Research & White Papers, Technology & Solutions, The Telecom Sector
Orange Polska can point to three clear examples of how SecBI’s Autonomous Investigation software has detected threats that other security controls missed.
5 Dec 2018 | Companies, Enterprise Security, People and Processes, Research & White Papers, Technology & Solutions, The Business of Cyber Security
Akamai is gaining traction with its enterprise security strategy but faces a number of challenges in seeking to outperform its achievements in cloud security.