Struggling to make time for Cyber Threat Hunting? Learn how with Huntsman

Chances are that over time you've added layers of security controls which have resulted in a growing number of alerts that need investigation. Analytics are key to threat resolution but effective cyber security is no longer a human scale process. With each new layer of defence the volume of alerts has grown to the point where only automation can help SOC analyst keep pace.

The key role threat intelligence can play in your cyber security strategy

Information security is ultimately focused on one key goal: reduction of risks. Risks of data loss, reputation damage, and disruption to the productivity of your organisation. But what drives the actions of your security teams?

Global Security Performance: How Top Nations Stack Up

How do some of the most prominent nations in the international economy differ in cybersecurity performance? As organizations increasingly open offices offshores, their networks face global security threats.


Tracking the most significant cyber threat: Ransomware

Imagine losing access to all of your critical data — only to find out you are being extorted by criminals who require payment in order to get it back. This is happening at an alarming rate and is commonly referred to as Ransomware.

A new vision for CISOs - Unprecedented visibility of your attack surface

According to a 2015 Gartner report, enterprises are shifting security budgets to security management platforms that integrate existing technologies, unify data from multiple vendors, provide greater insight through advanced analytics and enable security operations teams to automate and prioritise activities.

SC Editorial Webcast: What mobile policy suits your organisation?

When should you ban personal mobile use? Is Choose your own device appropriate, or can you safely harness the cost savings of Bring Your Own Device?

Unlock the power of mobile as the new desktop

There is no stopping the ubiquity of tablets and smartphones. Your employees are only going to use them more and more in their jobs — and customer service levels, enterprise agility, and overall profitability will improve because of it.

SC Editorial Webcast: Beyond the perimeter - Integrating mobile access to company data

Ensure the integrity and security of your company data when it is accessed or used beyond the enterprise walls by mobile devices and cloud services.

Sign up to our newsletters