The Latest in IT Security

Secrets of successful threat hunters and SOCs

26
Jul
2017

cybercrime-cyberattacks-cyberwar-hacking-hackers-hack-cyber-security-fraud-theft

McAfee has polled over 700 IT and security professionals from a diverse set of countries, industries, and organization sizes about the role of threat hunting and the evolution of the security operations center (SOC).

Per the survey, companies are investing in and gaining different levels of results from both tools and structured processes as they integrate “threat hunting” activities into the core security operations center.

Key findings
Looking at security teams through four levels of development – minimal, procedural, innovative and leading – the resulting report finds that:

Read More

Leave a reply


Categories

FRIDAY, APRIL 26, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments