I took the AT&T Chief Security Office "Security Challenge" at the AT&T Business Summit in Dallas last week. Here's what I made of it.
T-Systems wants to become Europe's largest provider of cyber security services. This HardenStance Briefing looks at how growing market share in the UK is key to achieving that goal.
This White Paper, sponsored by The Cyber Threat Alliance, IBM Security, KPN and Nokia looks at the importance of using Defensive and Incident Response (IR) playbooks as a foundational building block of security automation.
The U.S. District Court for the Northern District of California has dismissed the NSS Labs Anti Trust lawsuit against AMTSO. Thank goodness.
The OpenC2 Forum has approved its first specifications, putting the standard on a footing with which it can scale out into commercial deployments and increase speed and efficiency in cyber security operations.
The NSS Labs apology to CrowdStrike and resolution of their lawsuits is progress as far as it goes. But it still leaves outstanding the NSS antitrust suit against AMTSO.
It's clear from the proof-points offered up in a recent webcast that IBM Security and Cisco are serious about their cyber security alliance. In the near future, though, the partners will disrupt the cyber security market at the margins rather than transforming it.
AI isn't a 'silver bullet' for cyber security, neither does it need to represent unacceptable risk. Drawing on research into the experience of early adopters, this White Paper provides guidance on what to expect from AI in cyber security..
Orange Polska can point to three clear examples of how SecBI's Autonomous Investigation software has detected threats that other security controls missed.
Akamai is gaining traction with its enterprise security strategy but faces a number of challenges in seeking to outperform its achievements in cloud security.
Coming out of its global analyst event in New Jersey, it's clear that Nokia needs to further develop its security strategy to support its drive into enterprise networking.
Red Hat has a substantial portfolio of security features for container environments. These are designed to protect both the application and the underlying infrastructure.