Tag "Automation"

Back to homepage
Software

Protecting iOS and Android applications in a fully automated way

In this Help Net Security podcast recorded at Black Hat USA 2019, Dave Belt, Technology Evangelist at Irdeto, and Jaco du Plooy, VP Cloakware at Irdeto, discuss the current threat landscape,

Industry Insights

IoT Security: It’s Time Enterprises Take Responsibility

As IoT security threats increase, enterprises need to stop blaming the device maker and better secure their networks. Companies across industries are quick to say security is their top priority.

Cloud

The Cloud, Outages and You: Who’s Responsible for What?

For many companies, cloud service providers offer a good deal. You get unlimited computing power, storage space, access to advanced services and platforms and more, all for a relatively reasonable

Cloud

Solving Cloud Security Complexity With Visibility, Automation

There are two sides to every coin, as the old saying goes. It’s certainly the case with the cloud, as organizations of all sizes take advantage of the improved agility,

Software

Cybersecurity automation won’t fix the skills gap alone

What used to be considered forward-thinking of CISOs who implemented cybersecurity automation is now the standard. Gone are the days when antimalware was protection enough for sensitive data. Today, security

Software

Report Identifies 6 DevSecOps Pillars

At the Black Hat USA conference, the DevSecOps Working Group of the Cloud Security Alliance (CSA) announced it has published a report identifying the six pillars on which any set of best DevSecOps processes should be

Software

Automation, visibility remain biggest issues for cybersecurity teams

Organizations still do not have necessary levels of automation or visibility within their cyber terrain, especially as security stacks grow and are underutilized, Fidelis Cybersecurity’s annual State of Threat Detection

Software

Continuous Authorization with DevSecOps

Software development within the federal government often begins with an alignment to the Authorizations to Operate (ATO) and related, required security processes. Sometimes, these are an impediment to DevSecOps. So how can teams

Software

Security orchestration and automation checklist: How to choose the right vendor

Faced up against the well-chronicled global skills shortage, the ceaseless bombardment of security alerts and the hodgepodge of security tools unable to communicate with each other, security operations professionals likely feel

Hardware/Network

How To Block DDoS Attacks Using Automation

DDoS attacks can be catastrophic, but the right knowledge and tactics can drastically improve your chances of successfully mitigating attacks. In this article, we’ll explore the five ways, listed below,