A relatively new platform for data security is Security Orchestration, Automation, and...
Security & Compliance Blog
An Introduction to Security Debt
A subset of technical debt, security debt is essentially the vulnerabilities and flaws in your...
Security Automation: A Beginner’s Guide
Security automation refers to machine-actions that monitor, detect, troubleshoot and remediate...
What Is a Cyber Resilience Strategy?
Organizations’ dependence on internet-based technologies continues to hit new heights as...
Digital Forensics and Incident Response (DFIR): An Introduction
Digital forensics and incident response is an important part of business and law enforcement...
The Windows Curveball Vulnerability and What You Can Do About It
What is Curveball? I like to watch baseball, and am amazed at pitchers who can throw a good...
Introduction to Information Security Management Systems (ISMS)
Every technology-driven business process is exposed to security and privacy threats. Sophisticated...
Too Many Vulnerabilities and Too Little Time? Why Automation is...
Too Many Vulnerabilities and Too Little Time? Why Automation is an Imperative For today’s security...