Blog

15September

Intelligent Security Operations: A How-To Guide

The following is a how-to guide for implementing an intelligent SOC. Whether you are starting from the beginning or looking to take the next step in maturity of your existing security operations, this paper can be used as a guide to confirm steps you have taken to date and plan for what comes next.
  • information security, IT security, security
  • Posted by HPE  Posted on 15 Sep  0 Comments
  • Read More
15September

Threat Hunting: Open Season on the Adversary

Responses from 494 participants to the first SANS survey on threat hunting indicate that organizations are still figuring out exactly what a threat-hunting program should look like, how to attract the right skills and how to automate their processes.
  • insider threats, threat intelligence
  • Posted by HPE  Posted on 15 Sep  0 Comments
  • Read More
15September

Disrupting the Business of Hacking

This paper provides a short history of the enterprise security defenses developed to disrupt cyber attacks.
  • cyber attacks, hacking
  • Posted by HPE  Posted on 15 Sep  0 Comments
  • Read More
30June

Emerging threat: Wearables in the enterprise

Don’t look now, but your employees’ smart watches and fitness trainers pose new security risks
  • Apple Watch, cybersecurity, data privacy, Fitbit, Internet of Things, NSA, wearables
  • Posted by Beth Stackpole  Posted on 30 Jun  0 Comments
  • Read More
29June

Security in the age of artificial intelligence

As machines get smarter, how will they improve threat detection, prevention, and response?
  • advanced persistent threats, artificial intelligence, automation, cybersecurity, HPE, machine learning
  • Posted by Beth Stackpole  Posted on 29 Jun  0 Comments
  • Read More