article thumbnail

GUEST ESSAY: Top cybersecurity developments that can be expected to fully play out in 2019

The Last Watchdog

Artificial Intelligence (AI) and Machine Learning (ML) are going to be implemented into the arena of practical usage in cyber security – mainly for forensics and identification of culprits in cyber events. Investigating security events is costly both in terms of time and the expertise required.

article thumbnail

IaaS Security: Top 8 Issues & Prevention Best Practices

eSecurity Planet

Organizations may modify their security measures to their changing requirements without making major upfront expenses, whether it’s boosting bandwidth, adding encryption, or adopting extra security services. Security Monitoring & Logging IaaS providers provide security monitoring, logging, and auditing solutions.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Implementing and Maintaining Security Program Metrics

NopSec

Example Security Metrics *Note: This is an example and not to be considered an exhaustive list or necessarily applicable to your specific organization Security Policy/Compliance Adherence Regulatory control compliance Firewall/network security audit data Configuration compliance tracking Compensation control (aka exception) tracking and documentation (..)

article thumbnail

11 Key Steps of the Patch Management Process

eSecurity Planet

This backup acts as a safety net in the event that any problems develop during the patching procedure. It enables companies to check that patches were successfully installed, guarantee system operation, assess policy compliance, find new patches that need applying, and keep a consistent patching schedule.

article thumbnail

Best Managed Security Service Providers (MSSPs)

eSecurity Planet

Metrics: Monitors more than 150 billion security events per day in more than 130 countries. Intelligence: Threat intelligence and incident response services supported by IBM Security X-Force. Metrics: Six global SOCs analyze two billion events per day. Use Cases: Companies and governments in U.K., Secureworks.

Firewall 101
article thumbnail

What is Vulnerability Scanning & How Does It Work?

eSecurity Planet

Some SCM tools can scan devices and networks for vulnerabilities, track remediation actions, and generate reports on security policy compliance.