Technology & Solutions

White Paper: Next Steps in Playbook-Driven Cyber Security
This White Paper, sponsored by The Cyber Threat Alliance, IBM Security, KPN and Nokia looks at the importance of using Defensive and Incident Response (IR) playbooks as a foundational building block of security automation.

Report: Security Imperatives for Digital Transformation
The TM Forum commissioned HardenStance to research and write a report on some of the security challenges faced by telecom operators as they undergo digital transformation - and best practice as regards mitigating them.

Briefing: A New Window into an OpenC2 World
The OpenC2 Forum has approved its first specifications, putting the standard on a footing with which it can scale out into commercial deployments and increase speed and efficiency in cyber security operations.

White Paper: “Home Router Security: The Buck Stops Where?
A compromised home network threatens other users and infrastructure, not just the immediate residents. This new White Paper looks at what can be done about it and who by.

Briefing: The NSS Labs Apology to CrowdStrike
The NSS Labs apology to CrowdStrike and resolution of their lawsuits is progress as far as it goes. But it still leaves outstanding the NSS antitrust suit against AMTSO.

Briefing: ETSI Secures Public Clouds for Telcos
ETSI TC Cyber has released a new security standard that allows telcos to run core public telecom services in - wait for it - public clouds. Here's how it works and what it means for the telecom ecosystem.

White Paper: “AI in Cyber Security: Filtering out the Noise”
AI isn't a 'silver bullet' for cyber security, neither does it need to represent unacceptable risk. Drawing on research into the experience of early adopters, this White Paper provides guidance on what to expect from AI in cyber security..

Cyber Security Innovators: Orange Polska
Orange Polska can point to three clear examples of how SecBI's Autonomous Investigation software has detected threats that other security controls missed.

Briefing: Akamai’s Traction in Enterprise Security
Akamai is gaining traction with its enterprise security strategy but faces a number of challenges in seeking to outperform its achievements in cloud security.

Briefing: Nokia’s Enterprising Security Strategy
ComingĀ out of its global analyst event in New Jersey, it's clear that Nokia needs to further develop its security strategy to support its drive into enterprise networking.

Briefing: Container Security the Red Hat Way
Red Hat has a substantial portfolio of security features for container environments. These are designed to protect both the application and the underlying infrastructure.

Briefing: AI in Cyber Security and Cyber Warfare
Adversaries might not be using machine learning or AI to drive cyber attacks yet but it's a matter of time before they do. There are profound ethical concerns around the use of AI too, especially when it comes to its use in warfare.