Operational technology (OT) encompasses many aspects of our world, including industrial control systems (ICS) that are used to control core operational processes. ICS technologies often control essential services such as…
Browsing CategoryLog Management
Using Mystery Novel Techniques to Track Down Cyberthreats
How good are your sleuthing skills? Do you savor Agatha Christie novels and figure out who did it before the big reveal? If so, the skills you use to read…
6 Steps Every New CISO Should Take to Set Their Organization Up for Success
Congrats! You’ve landed a new job as a chief information security officer (CISO). Now where do you start? With some figures putting the typical CISO tenure at just around two…
Cloud Security With a Chance of Data Breaches
With the current data explosion and rise of artificial intelligence (AI), machine learning and deep learning, organizations must make sense of the vast amounts of data they collect to better…
Why User Behavior Analytics Is an Application, Not a Cybersecurity Platform
Last year, a cybersecurity manager at a bank near me brought in a user behavior analytics (UBA) solution based on a vendor’s pitch that UBA was the next generation of…