Aug 2, 2016 | Security Analytics
Are you waiting for something bad, or going somewhere good? A CEO asked me that once. It is one of those deep questions that we should all ponder at times. In the world of cybersecurity, the conventional thinking for a Security Operations Center (SOC) is to plant...
Nov 11, 2014 | Security Management, Vulnerability Management
Attackers exploit weakness. This age-old concept applies equally to castles and battleships, as it does to applications and networks. The more vulnerabilities a network has, the easier it is to attack and compromise. Nearly all of the recent high-profile attacks...
May 12, 2014 | Industry Analysis, Security Analytics
This is the final part of our three-part series on Security Analytics. You can view Part 1 and Part 2 here. In Part 1 and 2 of this series, we looked at the technology behind Security Analytics (SA) and where these technologies are going. In this final part, we will...
Apr 9, 2013 | Industry Analysis
War is beginning. Not in a galaxy far away, but to the industrial controls that make our life here on earth bearable. Inside every electric utility, sewage processing site, nuclear plant, and other industrial sites there is a whole army of SCADA devices controlling...