How Zero Trust Will Change Your Security Design Approach

As a security architect within IBM Security Services, I often get asked the question, “What exactly is a Zero Trust

Read more

Why Security Orchestration, Automation and Response (SOAR) Is Fundamental to a Security Platform

Security teams today are facing increased challenges due to the “new normal” created by the recent global health crisis. Teams

Read more

Refocusing Cybersecurity Best Practices on Security Hygiene

While organizations around the world are rightly focused on the COVID-19 pandemic, the work of cybersecurity must continue. In fact,

Read more

Stick the Landing: 6 Steps to Broaden Your Cyber Resilience Web

Cyber resilience emerged as a response to the evolving need for information security. Organizations recognized that attacks were a question

Read more

Gain Visibility Into Operational Technology (OT) Environments With a Combined SOC

Operational technology (OT) encompasses many aspects of our world, including industrial control systems (ICS) that are used to control core

Read more

COVID-19’s Remote Workforce: Protect Your Rapidly Growing Attack Surface

As organizations adapt and respond to the impact of COVID-19, significant new challenges are on the rise as a majority

Read more

How Relevance Scoring Can Make Your Threat Intelligence More Actionable

As businesses around the world become more global, the volume and complexity of attacks continue to grow. Protecting a company

Read more

4 Principles That Should Define Your Evolving Security Operations Model

I recently had the opportunity to speak at a security conference where I presented the operating models that an organization

Read more