“Fake News” Must Learn to Regulate Itself!

Digital interaction has surpassed interpersonal interaction — even grandmothers primarily interact with their grandchildren via iPad.  Almost everything we do can be done via an App or online, before long that’ll be the only way we can do anything. We have a word for this and that is “critical infrastructure,” and as a society we

Autonomous network security monitoring; analyzing the ‘breadcrumbs’ that are hiding in your Palo Alto Networks IPS/IDS logs

Detecting an intruder at the point of entry can have the greatest impact on reducing system compromise. That is why Network Intrusion Detection and Prevention Systems (IDS and IPS), such as Palo Alto Networks, are essential tools for any security organization, whether they are protecting the data of a large financial services company or the

What Would Ali Say About Being #124 on the Cybersecurity 500 List?

Respond-Software is #124 on the Cybersecurity Ventures annual ranking of the hottest and most innovative cybersecurity companies aka Cybersecurity 500 2018: The Official list. So here goes, “wow”, barely nine months after shipping our first product!?! What’s would Muhammad Ali say, “It’s not bragging if you can back it up.”

Did You Know Security Engineering Has Hidden Costs?

Security engineers supporting a Security Operations Center (SOC) face the difficult job of providing an appropriate quantity of actionable alerts to SOC analysts. Typically, they are tasked with presenting alerts of interest to the analyst and they accomplish this by managing detection technologies, developing detection content and integrating security context. As they try to maintain the analyst’s console, their duties become overly complicated and riddled with hidden costs.