2 12, 2020

Implementing and Securing Stadium Wi-Fi:
4 Best Practices to Follow

By |2020-12-03T17:14:09+00:00December 2nd, 2020|Categories: Network Security, Security Solutions, Stadiums, Wi-Fi|Tags: |

Wi-Fi is an essential part of today’s stadium experience. It keeps fans from crowding cellular networks. Employees use Wi-Fi for POS systems. Teams use it to connect to their playbooks. When Wi-Fi is inconsistent or insecure, it can interfere with stadium services or leave them vulnerable to bad actors. Learn more about the four best practices [...]

7 11, 2020

5 Ways SOAR Improves Collaboration Within a SOC Team

By |2020-12-02T21:11:03+00:00November 7th, 2020|Categories: Automation, Network Security, Orchestration, Security Solutions|Tags: , |

One of the first steps toward creating an effective Security Operations Center (SOC) is to ensure all team members collaborate seamlessly. This means that the software used by the SOC team should be easy to understand, user-friendly, and easily customizable. […]

4 11, 2020

SOAR for Success: How to Properly Measure KPIs for Security Operations

By |2020-12-02T20:47:39+00:00November 4th, 2020|Categories: Network Security, Security Solutions|Tags: , |

Nowadays, virtually every organization has to establish a set of KPIs (or Key Performance Indicators) in order to have a tangible perception of their progress toward reaching their desired targets, and the same applies to cyber security operations. […]

31 10, 2020

How SOAR Helps Protect Remote Workers from Cyber Threats

By |2020-12-02T21:13:53+00:00October 31st, 2020|Categories: Network Security, Security Solutions|Tags: , |

The current situation caused by the pandemic has affected the global health, economy and the cybersecurity sector. As hundreds of thousands of employees start working from home, hackers and fraudsters will undoubtedly try to exploit the vulnerabilities presented by poorly protected endpoints via home computers and devices. Malicious actors turn to all sorts of means to [...]

26 10, 2020

Why SOAR Is The Technology For The Future

By |2020-12-02T20:45:45+00:00October 26th, 2020|Categories: Network Security, Security Solutions|Tags: , |

In 2019, Gartner predicted that by the end of 2020, 30% of security teams with over 5 team members will be dependent on SOAR or similar automation and response solutions. To put it in perspective, in 2019, only 5% of security teams implemented SOAR in their security operations. […]

16 10, 2020

Limit Your Risk With an Integrated Security Solution

By |2020-10-16T14:40:51+00:00October 16th, 2020|Categories: AI, Machine Learning, Network Security, Security Solutions|Tags: |

The ever-increasing demands of security compliance are creating challenges within SOCs and the teams that support them. As compliance regulations become more stringent, CISOs and security administrators are forced to evaluate and implement new tools to remain compliant. This can create a new level of risk, as the teams responsible for maintaining the environment learn new, [...]

9 10, 2020

How Does an Integrated Approach to Security Compare To Other Security Platforms?

By |2020-10-12T18:26:47+00:00October 9th, 2020|Categories: AI, Machine Learning, Network Security, Security Solutions|Tags: |

The face of cybersecurity operations management is changing. As new threats surface, organizations require new ways to effectively manage and control incidents and requests in an efficient manner. The answer to this problem in the past has been to utilize different, disparate solutions for each facet of one’s business infrastructure, such as network, endpoint and cloud. [...]

31 07, 2020

Does Webex Meet Your Industry Security Requirements?

By |2020-08-03T19:38:30+00:00July 31st, 2020|Categories: Collaboration|Tags: , |

Every industry is different. While the security features protecting Cisco collaboration solutions are second to none, every collaboration customer has different security requirements based on their industry. Let’s explore three of Cisco’s sector-specific collaboration solutions and how they are protected. […]

Go to Top