Artificial Intelligence (AI) and Security: A Match Made in the SOC

Change is constant in cybersecurity — continual, rapid, dynamic change. It’s impossible to maintain an effective defensive posture without constantly

Read more

Gaining Insight Into the Ponemon Institute’s 2020 Cost of Insider Threats Report

Today, I’m pleased to share some of the key findings from the 2020 Cost of Insider Threats Global Report. This

Read more

What Are You Protecting Against? Deploying Proper Use Cases Is Critical to Build Security Maturity

Whenever I talk with clients interested in or anxious about cybersecurity, my first question falls to, “What are you protecting

Read more

Demystifying Security in an Open, Hybrid Multicloud Environment

We are currently witnessing a massive transition across organizations as more companies move application workloads to hybrid multicloud environments. This

Read more

The Forrester Wave: Unified Endpoint Management, Q4 2019 — The Next Phase of UEM Evolution

Last year, Forrester separated out unified endpoint management (UEM) into its own category in its research, defining UEM as “products

Read more

Machine Learning: With Great Power Come New Security Vulnerabilities

Machine learning (ML) has brought us self-driving cars, machine vision, speech recognition, biometric authentication and the ability to unlock the

Read more

Now’s the Time to Shift From Defense in Depth to Security in Depth

Today’s increasingly tech-savvy CEOs have a lot of questions for chief information security officers (CISOs). How do we know whether

Read more

How Analysts Connect Threat Intelligence Sources to Make Investigations More Efficient

I remember it like it was yesterday. I was supporting a counterterrorism task force and sitting in the heart of

Read more