Welcome to Smokey's Security Forums.
Guests have only limited access to the board and it's features, please consider registering to gain full access!
Registration is free and it only takes a few moments to complete.

Smokey's Security Forums

Please login or register.

Login with username, password and session length
Advanced search  


Surprise! Your online banking password might not be as secure as you thought

It turns out several leading US banks do not require case-sensitive passwords, which could make it easier for someone to access your account.

Surprise! Your online banking password might not be as secure as you thought

Malware Log Analysis & Removal Help * OTL (OldTimer ListIt) Tutorials & Tools * Ransomware Encryption & Decrytion Techniques * Official Jetico Inc. Support Forums

Share this topic on FacebookShare this topic on MySpaceShare this topic on RedditShare this topic on TwitterAuthorTopic: Why is IR Automation and Orchestration So Hot?  (Read 14 times)

0 Members and 1 Guest are viewing this topic.

ScarlettTopic starter

  • Updates Moderator
  • *
  • Offline Offline
  • location: Cymru
  • Posts: 21781
Why is IR Automation and Orchestration So Hot?
« Reply #1 on: March 16, 2017, 04:12:19 PM »
Why is IR Automation and Orchestration So Hot?
16 March 2017, 3:42 pm

I couldn’t attend the RSA Conference this year but many cybersecurity professionals and my ESG colleagues told me that incident response automation and orchestration was one of the hottest topics in the halls of the Moscone Center, through the bar at the W hotel, and even at the teahouse on the garden at Yerba Buena.   

Was this rhetoric just industry hype?  Nope.  This buzz is driven by the demand side rather than suppliers.  In truth, cybersecurity professionals need immediate IR help for several reasons:

1.      IR is dominated by manual processes.  Let’s face it, IR tasks like fetching data, tracking events, or collaborating with colleagues depend upon the organizational, communications, and technical skills of individuals within the security operations team.  These manual processes ultimately get in the way of overall IR productivity.  In a recent research project, infosec pros were asked: ‘Do you believe that your organization’s incident response efficiency and effectiveness are limited by the time and effort required for manual processes?’ Fifty-two percent of cybersecurity professionals responded, “yes, significantly” while another 41% said, “yes, somewhat.”  Furthermore, 27% of cybersecurity pros say they spend 50% or more of their IR time on manual processes. 

To read this article in full or to leave a comment, please click here

Source: Network World Security

>> To obtain the full NetworkWorld Security article, click the link in the first post line <<

* Permissions
You can't post new topics.
You can't post replies.
You can't post attachments.
You can't modify your posts.
BBCode Enabled
Smilies Enabled
[img] Enabled
HTML Disabled

Except where otherwise stated, all content, graphics, banners and images included © 2006 - 2017 Smokey Services™ -- All rights reserved
Design board graphics, banners and images by Meg&Millie - Emma aka Tinker

This site does not store profiling-, tracking-, third-party and/or any other non-essential cookie(s) on client computers and is fully compliant with the EU ePrivacy Directive
Smokey's does not use any Web Analytics/Analysis Service, and also does not use any browser fingerprinting techniques



Smokey's provide free fully qualified OTL (OldTimer ListIt) and FRST (Farbar Recovery Scan Tool) Log / Malware Analysis & Removal Help and System Health Checks