The dream of a “self-defending” network has been alive for a decade. However, recent advances in Security Analytics technologies portend the possibility of a future where humans are removed from incident response.
How do you build a successful vulnerability management program? It involves a lot more than just scanning devices. Effective vulnerability management comes from a holistic, systemic approach that involves the entire IT organization.
Good news everybody, Symantec is breaking up. The company will separate their storage and security groups into two distinct companies beginning next year. The full details of Symantec’s break up are here or read Symantec’s site here. The reaction to this news among analysts and customers has been mostly positive. Now, whether this actually improves Symantec or… Read More »