Part 2: What ‘Mr. Robot’ Can Teach Us About Incident Response

We continue with the second part of our two-part series. If you missed the first part, we are discussing what security professionals can learn from the hit series, "Mr. Robot." The series explores[…]

Read More

5 Tips on Hiring and Retaining the Right Cybersecurity Talent

If you are a cybersecurity professional, you already know that there is a serious shortage of qualified talent. According to the U.S. Bureau of Labor Statistics, there were almost 210,000 unfilled[…]

Read More

2017 SOC Planning: How to Bring People, Process and Technology Together

Cybersecurity professionals encounter the concept of integrating people, processes and technology frequently. The concept will appear in virtually every vendor's sales presentation as well as in[…]

Read More

Lessons Security Professionals Can Learn from "Mr. Robot"

It is not often that movies and television shows give viewers the opportunity to explore the world of hacking and digital security in a realistic manner. After two seasons, "Mr. Robot" has[…]

Read More

Use Email for Messages, Not for Incident Management

As a CISO, you know how difficult it is to recruit the best staff. Once you bring them on board, you must also work to retain them — after all, their skills are in short supply, and your[…]

Read More

Top 10 Best Practices for Cyberbreach Post-Crisis Communication

 

According to an article appearing in AT&T Cybersecurity Insights, 62 percent of all organizations surveyed admitted that they had suffered a breach in 2015. Furthermore, although 42 percent[…]

Read More

Demisto Delivers Integration with Intel Security for a Simplified Incident Response Management

We are very excited to announce our seamless integration with Intel Security today that helps SOC teams achieve a more simplified incident response management. Demisto’s Security Operations[…]

Read More

Security Automation is all the Rage at Black Hat Europe 2016

You are one step away from security automation by attending Black Hat Europe 2016 in London.

Security automation is the next big thing in the war against hacker attacks as it is the key to[…]

Read More

Important Tips for Updating Your Breach Response Plan

With so much attention given to increasingly prevalent data breaches by the media these days, you might think that every enterprise would have an effective breach response plan in place. However,[…]

Read More

Incident Response in the Age of Cloud

Most CISOs receive a rude awakening when they encounter their first major security issue in the cloud. If they identify a critical vulnerability that requires a patch, they may not have the[…]

Read More