This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
Security Magazine logo
  • MAGAZINE
    • eMagazine
    • This Month's Issue
    • Archives
  • NEWS
    • Security Newswire
    • COVID-19
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • The Security Benchmark Report survey
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Videos
      • Cybersecurity & Geopolitical Vodcast
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
    • Call for Entries
  • CONTACT
    • Advertise
    • Editorial Guidelines
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Home » Keywords » automation

Items Tagged with 'automation'

ARTICLES

automation_enews

Securing business automation amidst remote work

Borya Shakhnovich
February 12, 2021
In today’s world, business process automation solutions are considered the fastest-growing segment on the global enterprise software market. However, both business owners and frequent users alike often express their doubts about the capability of automation tools to operate at the proper level required by enterprise data security, especially with many employees working from home due to the pandemic.
Read More
remote work

Cybersecurity postures stronger than pre-pandemic for many

February 2, 2021

Siemplify released new research on “The State of Remote Security Operations.” Based on a recent survey of nearly 400 security operations (SecOps) professionals, the report studies how the sudden shift to remote work during the COVID-19 pandemic has affected SecOps analysts’ ability to perform their jobs and the impact on overall security postures.


Read More
SEC0121-Prods-Feat-slide1_900px

Product Spotlight on Automation (Robots and Drone Mitigation)

Maria henriquez
Maria Henriquez
January 15, 2021

Facilitate security operations or mitigate drone threats with these automated solutions.


Read More
How the Security Operations Center Can Create Customer Confidence

Curiosity, creativity, collaboration: The human elements of the SOC

Chris Calvert
November 23, 2020
Machines are better at speed and scale than humans. But humans have the edge over machines at thinking outside of the box, using their curiosity and creativity to come up with solutions, and reasoning that machines cannot define or replicate. When it comes to security operations, humans and automation are the duo that’s stronger and more effective in partnership than when they’re apart. Using extended detection and response (XDR) can bring these skills to the forefront of the Security Operations Center (SOC), leaving the repeatable, boring tasks to the machines and allowing for these human traits to shine.
Read More
cybersecurity

The future of SOAR (Is there one?)

SOAR’s place in the fast-moving security arena has changed, and it is being swallowed up by advanced SIEMs. A new Gartner report sheds light on how the market has shifted and lays bare the paradox of smaller SOC teams, who need automated triage the most but aren’t able to maintain a SOAR.
Avichesla
Avi Chesla
November 18, 2020
Security Orchestration, Automation and Response (SOAR) solutions came on the market around six years ago. The two main objectives of these tools were to orchestrate 3rd party tools for filtering false positive alerts out of the network, and to automatically block attacks. SOAR came on the scene with bold statements to fill in some of the gaps that existed in Security Information and Event Management (SIEM) platforms, which have been making security analysts miserable for twenty years now.
Read More
automation_enews

Young cybersecurity professionals fear being replaced by technology

October 16, 2020
Despite 88% of cybersecurity professionals believing automation will make their jobs easier, younger staffers are more concerned that the technology will replace their roles than their veteran counterparts, according to new research by Exabeam.
Read More
automation_enews

60% of US businesses have adopted automation approaches across their networks

September 21, 2020
The time it takes to get engineers onsite (52% in the US and 42% globally), inadequate network monitoring (41% in the US and 36% globally) and a lack of in-house skill (40% in both the US and globally) are among the biggest challenges organizations face in resolving a network outage quickly, according to a recent study commissioned by Opengear, a Digi International company.
Read More
SEC0820-Data-Feat-slide1_900px.jpg

Compliance regulators don’t stop working when companies go remote

Jeff sizemore
Jeff Sizemore
September 18, 2020
Compliance regulators don’t take days off – not even in a pandemic. Faced with steep penalties for non-compliance and potential reputational damage, organizations are being forced to rethink their compliance strategies to account for new and emerging risks. For digital businesses today, the best place to start is by assessing how systems should be good enough, understand how data integrity is currently being managed, identifying any compliance hazards or gaps, and considering how automation can help address them.
Read More
cyber6-900px.jpg

New research finds that the IT security skills gap is getting bigger

August 26, 2020
The shortage of skilled information security practitioners continues to grow around the globe. Based on 200 IT executives and contributors who primarily serve in information or IT security roles, this new research found that in the United States, for organizations with at least 500 employees, the average number of open positions enterprises are trying to fill is 1,324. For the largest percentage of respondents in this survey, that number increased between 1 percent and 25 percent over the last year, although that increase is higher for large enterprises.
Read More
SEC0519-Cyber-Feat-slide1_900px

Department of Energy announces $37 million for AI and ML at DOE scientific user facilities

August 20, 2020
The U.S. Department of Energy (DOE) announced $37 million in funding for research and development in artificial intelligence and machine learning methods to handle data and operations at DOE scientific user facilities. 
Read More
More Articles Tagged with 'automation'
Subscribe For Free!
  • eMagazine Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • sponsored-content-BNP-covid__3J9FMQPY3I__
    Sponsored bySureView Operations

    How command centers are responding to COVID-19

Popular Stories

Allied officially able to complete G4S acquisition

G4S acquisition comes to an end; Allied now 7th largest employer in world

cyber security

CNA Financial hit by cyberattack

messaging platforms freepik

Slack removes message invites in DM feature over harassment concerns

Workplace violence a problem

Workplace violence rises, particularly for nurses, frontline workers

ransomware - cyber

Clop ransomware gang breaches University of Colorado and University of Miami

4.22_SEC_SBS_360x184_customcontent

Events

September 24, 2020

Pandemics, Recessions and Disasters: Insider Threats During Troubling Times

ON DEMAND: The insider threat—consisting of scores of different types of crimes and incidents—is a scourge even during the best of times. But the chaos, instability and desperation that characterize crises also catalyze both intentional and unwitting insider attacks. Learn how your workers, contractors, volunteers and partners are exploiting the dislocation caused by today's climate of Coronavirus, unemployment, disinformation and social unrest.

October 28, 2020

Industrial Cybersecurity: What Every Food & Bev Executive Needs to Know

ON DEMAND: There's a lot at stake when it comes to cybersecurity. Reputation, productivity, quality. Join us to discuss the future of your global security strategy and a path forward with trusted partners Cisco and Rockwell Automation, and turn your Food & Bev security challenges into strategic advantages that drive business value.

View All Submit An Event

Poll

Who has ownership or primary responsibility of video surveillance at your enterprise?

Who has ownership or primary responsibility of video surveillance at your enterprise?
View Results Poll Archive

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security 500 360

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2021. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing