Security Orchestration: Beware of the Hidden Financial Costs

Among the many improvements in cybersecurity technology and tools we’ve seen over the last few years, one of the most significant has been the inclusion of security automation and orchestration capabilities in solution categories beyond SOAR platforms. SIEM providers acquired stand-alone SOAR platforms, and endpoint detection and response (EDR) solutions broadened to include automation and […]

Continue Reading

Lessons for Better Fraud Decision-Making

Have you ever stopped to think about how you go about deciding whether to try a new restaurant that you’ve never been to? Even if you don’t realize what you are doing, when you make this decision, you are likely collecting data around a number of different criteria, analyzing those data points, and then using […]

Continue Reading

Facilitating the Convergence of Physical Security and Cyber Security With Open Source Intelligence

The desire to merge aspects of physical and cyber security is nothing new, especially in maturing enterprises that are proactively extending their security capabilities. Since many aspects of physical security are connected to the internet, enterprises have started to build fusion centers that combine disciplines. By doing so, they are able to converge cyber and […]

Continue Reading

Digital Experience Monitoring: More Important Than Ever

With the shift to work-from-anywhere, many organizations have seen an increase in scale of remote work locations that their IT team must support. At the same time, users expect consistent and good quality experiences no matter where they are. Ultimately, users want their technology to work, and they don’t care what happens in the backend […]

Continue Reading