3-steps-to-automating-security-operations
Cybersecurity Solutions

United States government agencies and the subcontractors that serve them have long been a prime target for...

Scott Parker
by Scott Parker
Security Operations Software

Given the growing data and number of tools, organizations are finding it difficult to hire the people...

Dan Lamorena
by Dan Lamorena
Security Operations Software

When I was a kid, I loved to solve jigsaw puzzles.  As I got older, and maybe...

Mike Reynolds
by Mike Reynolds
Perspective

What’s the #1 giveaway at RSAC this year? Hand sanitizer. The RSA Conference of 2020 replaced handshakes with friendly fist...

Dan Lamorena
by Dan Lamorena
SOC Analysis

Since its advent nearly a quarter century ago, the security operations center (SOC) has become part of...

Chris Calvert
by Chris Calvert
Security Operations Software

The average human spends 26 years sleeping, 4 ½ years eating and almost 11 ½ years looking...

Mike Reynolds
by Mike Reynolds
Company

This year’s RSA Conference is almost upon us, with the theme of the “Human Element.” The idea...

Dan Lamorena
by Dan Lamorena
Security Operations

Alternative asset management firms face outsized information security risks—the perils that come with handling financial transactions in...

Dan Lamorena
by Dan Lamorena
Security Operations

It is not often that the challenges in the transportation industry mirror that of cybersecurity, but per...

Dan Lamorena
by Dan Lamorena

Join our growing community! Subscribe to our newsletter, the "First Responder Notebook," delivered straight to your inbox.