Tag: automation
-
SOAR buyer’s guide: 11 security orchestration, automation, and response products, and how to choose
Tags: access, ai, api, attack, automation, business, chatgpt, cisco, cloud, compliance, container, cybersecurity, data, detection, edr, endpoint, firewall, fortinet, gartner, google, group, guide, Hardware, ibm, incident response, infrastructure, intelligence, jobs, LLM, malware, mandiant, marketplace, microsoft, mitigation, monitoring, network, okta, risk, saas, security-incident, service, siem, soar, soc, software, technology, threat, tool, training, vulnerability, vulnerability-management, zero-daySecurity orchestration, automation, and response (SOAR) has undergone a major transformation in the past few years. Features in each of the words in its description that were once exclusive to SOAR have bled into other tools. For example, responses can be found now in endpoint detection and response (EDR) tools. Orchestration is now a joint…
-
Best Practices & Risks Considerations in LCNC and RPA Automation
Low-code/no-code (LCNC) and robotic process automation (RPA) technologies allow companies to speed up development processes and reduce costs, but security is often overlooked. When this happens, the risks can outweigh the benefits. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/best-practices-risks-considerations-lcnc-rpa-automation
-
Scaling penetration testing through smart automation
In this Help Net Security interview, Marko Simeonov, CEO of Plainsea, discusses how organizations can move beyond compliance-driven penetration testing toward a more … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/01/08/marko-simeonov-plainsea-penetration-testing-automation/
-
HCL BigFix Server Automation: Angreifer können Traffic umleiten
Die Endpoint-Management-Plattform HCL BigFix Server Automation ist verwundbar. Angreifer können an mehreren Sicherheitslücken ansetzen. First seen on heise.de Jump to article: www.heise.de/news/HCL-BigFix-Server-Automation-Angreifer-koennen-Traffic-umleiten-10230214.html
-
Overcome AST noise to find and fix software vulnerabilities
Too many AST tools create noise for security and dev teams. Learn why automation is key to finding and fixing what’s important. The post Overcome AST noise to find and fix software vulnerabilities appeared first on Blog. First seen on securityboulevard.com Jump to article: https://securityboulevard.com/2025/01/overcome-ast-noise-to-find-and-fix-software-vulnerabilities/
-
Microsoft Sentinel: A cloud-native SIEM with integrated GenAI
Tags: ai, attack, automation, breach, business, cloud, cyber, cybersecurity, data, data-breach, detection, edr, intelligence, microsoft, risk, siem, skills, soar, soc, technology, threat, tool, training, vulnerabilityIn a recent survey, 74% of cybersecurity professionals said that the threat landscape is the worst they’ve seen in 5 years.1 Escalating cyber threats, an expanding attack surface, and staffing shortages are putting tremendous pressure on the security operations center (SOC).It’s never been more important to have the right tools in place, especially when it…
-
Blown the cybersecurity budget? Here are 7 ways cyber pros can save money
Tags: access, advisory, ai, automation, business, cio, ciso, cloud, control, cyber, cybersecurity, finance, governance, group, guide, infrastructure, intelligence, international, jobs, office, risk, service, skills, software, strategy, technology, threat, tool, training, vulnerability, vulnerability-managementIt’s hard to find a CISO or cybersecurity leader who has the money they need to pay for all the work they want to do.A majority of CISOs (57%) said they expect to see an increase in their cybersecurity budgets over the next one to two years, according to Deloitte’s Global Future of Cyber Report,…
-
reconFTW: Open-source reconnaissance automation
reconFTW is an open-source tool that simplifies and automates the reconnaissance process, delivering subdomain enumeration, vulnerability assessment, and gathering … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/12/30/reconftw-open-source-reconnaissance-automation/
-
Achieve Satisfaction with Streamlined Secrets Rotation Processes
Are Secrets Rotation Processes a Keystone in Your Cybersecurity Strategy? The digital business landscape has evolved with technologies enabling organizations to seamlessly maneuver their operations in the cloud. As a cybersecurity professional, have you considered that as we accelerate towards a future driven by automation, the effective management of Non-Human Identities (NHIs) and secrets rotation……
-
Salt Security Tackles API Risks with AI-Powered Innovations
CEO Roey Eliyahu on Using AI to Simplify API Security. Salt Security CEO Roey Eliyahu highlights innovations such as Pepper, an AI-based assistant for API discovery and rapid threat response. The platform helps reduce expertise requirements and simplify API security through governance automation and advanced analytics. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/salt-security-tackles-api-risks-ai-powered-innovations-a-27141
-
The Future of Growth: Getting Back to Basics in an AI-Powered World
As AI revolutionizes sales and marketing, successful businesses are returning to fundamental growth principles. Explore how to balance automation with authentic human connection in this comprehensive guide to future-proof your growth strategy. First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/the-future-of-growth-getting-back-to-basics-in-an-ai-powered-world/
-
The Rise of Agentic AI: How Hyper-Automation is Reshaping Cybersecurity and the Workforce
As artificial intelligence evolves, its impact on cybersecurity and the workforce is profound and far-reaching. Predictive AI once enabled security teams to anticipate threats, and generative AI brought creativity and automation to new levels. Now, we stand at the threshold… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/the-rise-of-agentic-ai-how-hyper-automation-is-reshaping-cybersecurity-and-the-workforce/
-
Newly uncovered attack exploits Microsoft’s UI Automation framework
First seen on scworld.com Jump to article: www.scworld.com/brief/newly-uncovered-attack-exploits-microsofts-ui-automation-framework
-
What could the API Landscape look like in 2025?
As we step into 2025, the API landscape is undergoing a transformative shift, redefining how businesses innovate and scale. APIs are no longer just enablers of connectivity; they are the architects of ecosystems, powering everything from seamless automation to AI-driven services. The new year will prove to be a pivotal year for the API ecosystem…
-
How Secure Automation Saves Your Cloud Operations
Why is Secure Automation Essential for Cloud Operations? Modern businesses operate within a complex ecosystem. How can they ensure their cloud operations remain secure, streamlined, and efficient? The answer lies in secure automation. This blog post will delve into why secure automation is a must-have for any business, especially those relying heavily on cloud-based operations……
-
KI, Automation und menschliche Expertise – Sechs Cybersecurity-Trends und Vorhersagen für 2025
First seen on security-insider.de Jump to article: www.security-insider.de/security-trends-2025-ki-kommunikation-automatisierung-a-a1c078d8d59c77189df14fb11dbd8c8c/
-
Harnessing Threat Intel and Automation to Counter Supply Chain Risks
First seen on scworld.com Jump to article: www.scworld.com/perspective/harnessing-threat-intel-and-automation-to-counter-supply-chain-risks
-
Detection Engineer’s Guide to Powershell Remoting
Tags: access, attack, automation, computer, control, credentials, crowdstrike, cyberattack, data, detection, edr, endpoint, exploit, firewall, guide, hacker, malicious, microsoft, mitre, monitoring, network, penetration-testing, powershell, risk, service, siem, threat, tool, update, windowsPowershell Remoting is a powerful feature in Windows that enables IT administrators to remotely execute commands, manage configurations, and automate tasks across multiple systems in a network. Utilizing Windows Remote Management (WinRM), it facilitates efficient management by allowing centralized control over endpoints, making it an essential tool for system administrators to streamline operations and maintain…
-
Catching the ghost in the machine: Adapting threat detection to cloud speed
The rapid adoption of cloud technology has transformed how businesses operate, offering scalability, agility, and opportunities for innovation. However, this transformation has also introduced a profound challenge: the “ghost in the machine””, elusive and dynamic threats that exploit the complexity and scale of cloud environments to remain hidden, evading traditional detection methods and posing significant…
-
Interview mit IBM Was ist der Unterschied zwischen Monitoring und Observability?
In der IT-Welt wird Monitoring und Observability häufig synonym verwendet. Allerdings gibt es gravierende Unterschiede und selbst bei der Observability gibt es unterschiedliche Ausrichtungen. Netzpalaver sprach via Remote-Session mit Georg Ember, Senior IT Architect and Brand Technical Specialist, AIOPs and Automation, IBM Technology, DACH, darüber welche Unterschiede es beim Monitoring und Observability gibt, deren Einsatzgebiete…
-
Security leaders top 10 takeaways for 2024
Tags: access, ai, attack, automation, best-practice, breach, business, ciso, cloud, compliance, corporate, crowdstrike, cybercrime, cybersecurity, data, deep-fake, detection, email, finance, fraud, governance, group, guide, hacker, identity, incident response, infosec, ISO-27001, office, okta, phishing, privacy, programming, regulation, risk, risk-management, saas, security-incident, service, software, startup, strategy, technology, threat, tool, training, vulnerabilityThis year has been challenging for CISOs, with a growing burden of responsibility, the push to make cybersecurity a business enabler, the threat of legal liability for security incidents, and an expanding attack landscape.As the year comes to a close, CISOs reflect on some of the takeaways that have shaped the security landscape in 2024.…
-
Time of Reckoning Reviewing My 2024 Cybersecurity Predictions
Tags: ai, attack, automation, awareness, breach, business, chatgpt, china, compliance, cyber, cyberattack, cybercrime, cybersecurity, data, data-breach, disinformation, election, espionage, exploit, healthcare, incident response, infrastructure, jobs, law, linkedin, malware, monitoring, moveIT, phishing, privacy, ransomware, regulation, risk, russia, service, software, supply-chain, technology, threat, tool, ukraine, update, vulnerability, warfare, zero-dayThe brutal reality is that cybersecurity predictions are only as valuable as their accuracy. As 2024 comes to a close, I revisit my forecasts to assess their utility in guiding meaningful decisions. Anyone can make predictions (and far too many do), but actually being correct is another matter altogether. It is commonplace for security companies…
-
How to Generate a CrowdStrike RFM Report With AI in Tines
Run by the team at orchestration, AI, and automation platform Tines, the Tines library contains pre-built workflows shared by real security practitioners from across the community, all of which are free to import and deploy via the Community Edition of the platform. Their bi-annual “You Did What with Tines?!” competition highlights some of the most…
-
Attackers can abuse the Windows UI Automation framework to steal data from apps
An accessibility feature built into Windows to facilitate the use of computers by people with disabilities can be abused by malware to steal data from other applications or control them in malicious ways that evades detection by most endpoint protection systems.The Windows UI Automation framework has existed since the days of Windows XP and provides…
-
Anton’s Security Blog Quarterly Q4 2024
Tags: ai, automation, ciso, cloud, cyber, defense, detection, edr, google, governance, incident response, metric, office, security-incident, siem, soc, threat, vulnerability, vulnerability-management, zero-trustAmazingly, Medium has fixed the stats so my blog/podcast quarterly is back to life. As before, this covers both Anton on Security and my posts from Google Cloud blog, and our Cloud Security Podcast (subscribe). Meta AI creation, steampunk theme Top 10 posts with the most lifetime views (excluding paper announcement blogs): Security Correlation Then…

