People and Processes
Noetic Cyber is targeting the cyber asset management and continuous controls monitoring market (CCM) spaces. The three founders were all early employees of Resilient Systems Inc.View the Cyber Startup Briefing
Managed Detection and Response (MDR) is a critical cybersecurity service category. Sponsored by AT&T, Secureworks, Fortinet and ElevenPaths, this White Paper guides users on what to expect both from their provider and themselves in an MDR partnership.
The new open standard STIX and TAXII 2.1 releases have been approved by OASIS. A new self-certification program should help drive adoption and enable SOC teams to arrive at faster time to detection and time to mitigation.
Cloud Native principles and tools are now the only way forward for telcos to achieve their digital transformation goals. This White Paper articulates what this means in terms of working practices, development and operations models and new security requirements.
I took the AT&T Chief Security Office "Security Challenge" at the AT&T Business Summit in Dallas last week. Here's what I made of it.
This White Paper, sponsored by The Cyber Threat Alliance, IBM Security, KPN and Nokia looks at the importance of using Defensive and Incident Response (IR) playbooks as a foundational building block of security automation.
The OpenC2 Forum has approved its first specifications, putting the standard on a footing with which it can scale out into commercial deployments and increase speed and efficiency in cyber security operations.
It's clear from the proof-points offered up in a recent webcast that IBM Security and Cisco are serious about their cyber security alliance. In the near future, though, the partners will disrupt the cyber security market at the margins rather than transforming it.
ETSI TC Cyber has released a new security standard that allows telcos to run core public telecom services in - wait for it - public clouds. Here's how it works and what it means for the telecom ecosystem.
AI isn't a 'silver bullet' for cyber security, neither does it need to represent unacceptable risk. Drawing on research into the experience of early adopters, this White Paper provides guidance on what to expect from AI in cyber security..
Orange Polska can point to three clear examples of how SecBI's Autonomous Investigation software has detected threats that other security controls missed.
Akamai is gaining traction with its enterprise security strategy but faces a number of challenges in seeking to outperform its achievements in cloud security.