People and Processes
I took the AT&T Chief Security Office "Security Challenge" at the AT&T Business Summit in Dallas last week. Here's what I made of it.
This White Paper, sponsored by The Cyber Threat Alliance, IBM Security, KPN and Nokia looks at the importance of using Defensive and Incident Response (IR) playbooks as a foundational building block of security automation.
The OpenC2 Forum has approved its first specifications, putting the standard on a footing with which it can scale out into commercial deployments and increase speed and efficiency in cyber security operations.
It's clear from the proof-points offered up in a recent webcast that IBM Security and Cisco are serious about their cyber security alliance. In the near future, though, the partners will disrupt the cyber security market at the margins rather than transforming it.
ETSI TC Cyber has released a new security standard that allows telcos to run core public telecom services in - wait for it - public clouds. Here's how it works and what it means for the telecom ecosystem.
AI isn't a 'silver bullet' for cyber security, neither does it need to represent unacceptable risk. Drawing on research into the experience of early adopters, this White Paper provides guidance on what to expect from AI in cyber security..
Orange Polska can point to three clear examples of how SecBI's Autonomous Investigation software has detected threats that other security controls missed.
Akamai is gaining traction with its enterprise security strategy but faces a number of challenges in seeking to outperform its achievements in cloud security.
Telcos should consider partnering leading managed security services players to share risk, assets and know-how, and grow their revenues and brand in this market.
A joint White Paper published by HardenStance partner, the Cyber Rescue Alliance, and Nokia entitled "Cyber Security In The Boardroom". Download the White Paper
I participated in this March 13th 2018 Light Reading webinar with Nokia discussing new approaches to leveraging analytics and router infrastructure for DDoS protection. Click on this link for the archived webinar.
Introducing the first in a new series of "Cyber Security Innovators" reports. This first one is on KPN, the Dutch telecom operator