Automated Security Alert Remediation: A Closer Look
This post was previously published on The New Stack. In cloud-native organizations and software as a service (SaaS) businesses, cloud security ..
What Is CSPM? A Closer Look at Cloud Security Posture Management
As we previously discussed in the Automating Your Cloud Security Posture Management (CSPM) Response blog post, CSPM is a vital component ..
SOARs vs. No-Code Security Automation: The Case for Both
This post was previously published on The New Stack. Just a few years ago, security orchestration, automation and response (SOAR) was the new buzzword ..
SecOps in a Post-Covid World: 3 Security Trends to Watch
This post was previously published on The New Stack. By now, you’ve probably read loads of articles that discuss the COVID-19 pandemic’s ..
Collective Cybersecurity: A Shared Responsibility Model
This post was previously published on The New Stack Want Real Cybersecurity Progress? Redefine the Security Team The state of cybersecurity ..
Open Source Cybersecurity: Towards a Democratized Framework
This post was previously published on The New Stack Today, anyone can contribute to some of the world’s most important software platforms ..
How to Fix the Broken State of Cybersecurity Culture
Which cultural values empower businesses to thrive today? That’s an open question, of course. But I suspect most employees, managers, ..
4 Ways to Automate Controlled Access to Sensitive Data
Controlling access to sensitive data is tough. Be too restrictive, and your employees run into too many roadblocks to do their jobs effectively. ..