U.S. federal regulators are revamping their approach to oil pipeline cybersecurity by telling operators they have newfound latitude so long as they implement continuous monitoring and test their posture. Pipeline cybersecurity became a priority after a 2021 ransomware attack led to gas shortages.
Ransomware operators, crypto miners and initial access brokers are increasingly targeting the same networks for compromise, creating a new set of challenges for defenders. Sophos has brought together three teams of cybersecurity experts to help businesses defend against changing threats.
As the world embraces renewables and green energy, is the energy sector properly learning from past cybersecurity mistakes? Rafael Narezzi, CTO of CF Partners, discusses current industrial cybersecurity shortcomings and the need for the industry to take a more mature and proactive approach.
The ESG Research Report includes a double-blind survey of enterprises – composed of various industry verticals.
Key Takeaways:
The challenges driving change in security operations.
How your peers are changing up prioritizing addressing growing attack surface and threat landscape complexity.
How improving...
Download and read this IDC Voice of the Analysts report and learn how to:
Reduce and automate functions that are not aligned to analysts’ core mission;
Enable analysts to do what they do best - hunt, detect, and eliminate the bad guys;
Use automation in the right place to handle the high volume of data to...
Most publicly traded security vendors specialize in one technology category, but Palo Alto Networks has built out industry-leading practices around network security, cloud security and security operations. CEO Nikesh Arora discusses this unique path.
Devo has closed its Series F round and notched a $2 billion valuation to incorporate more capabilities into its SOC via acquisition. The company plans to use the $100 million to buy companies that will provide customers with additional intelligence on top of Devo's data for specific use cases.
XDR is quickly becoming a preferred solution for security teams seeking a coordinated, holistic approach to their security operations.
By empowering teams with limitless ingestion, analysis, and protection across the entire organization, Elastic's Limitless XDR offering unifies data types to improve detection,...
Orchestration and automation have shifted from “nice to have” to “must-have” in the
enterprise – particularly post-breach, says Christine Vanderpool, CISO at Florida
Crystals Corp. She and Splunk’s Ryan Kovar share insights and tips on how to get
maximum value from these emerging technologies.
Download...
The new Expel Quarterly Threat Report provides data on what we’re seeing,
detection opportunities, and resilience recs to help protect your organization.
We’ll dive into the trends in this report, based on incidents the Expel security
operations center (SOC) team identified through investigations into...
The average SOC and its personnel are 'lost in the noise' caused by an overflow of alerts. The adversaries know this and take full advantage. Randy Watkins, CTO of Critical Start, advises on the role MDR can play in resolving all alerts and detecting/stopping attacks.
Elastic has been named a Strong Performer in the 2022 Forrester Endpoint Detection and Response Providers Wave.
Elastic Security provides a different approach from other endpoint detection and response (EDR) vendors by combining EDR and SIEM capabilities, substantially reducing customers’ mean time to detect and...
Forrester analysts Allie Mellen and Jeff Pollard discuss their new research on the analyst experience, or AX. AX involves how security analysts perceive their interactions with security products, services and processes, and Mellen and Pollard say it can improve the SOC and security analyst workflow.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.