CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
  • See all results
Home
Security Automation
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Security Automation

Hand reaching for glasses against backdrop of data showing security analysts working on security automation
Cyber SecurityNews

Burdened by False Positives, Security Analysts Report Increased Stress Created by Security Automation Tools

February 22, 2021
Security automation is increasingly becoming a necessity in order to keep up with the cyber threats, but security analysts report significant increased stress on the job driven by fear of missing alerts. Read More
Gear virtual icons on data centre racks shows new study suggests security automation may cause substantial cybersecurity workforce reductions
Cyber SecurityNews

New Study Suggests Security Automation Will Cause Dramatic Improvements, but Also Substantial Cybersecurity Workforce Reductions

February 17, 2020
Even though organizations are expecting security automation to reduce their cybersecurity workforce, it also helps them to focus on overall network security and the most serious vulnerabilities. Read More
Padlock symbol for system showing network security automation
Cyber SecurityInsights

Going Beyond Zero Touch Network Security Automation to Gain Full Business Innovation

December 9, 2019
By going beyond today’s version of “zero-touch” network security automation, enterprises gain real-time visibility and adaptive control over their network security operations, ultimately advancing business innovation and financial growth. Read More
Control center for security automation without any cybersecurity pros
Cyber SecurityInsights

New Juniper Report Highlights Need for Security Automation and Additional Cybersecurity Pros

July 5, 2018
Given the dearth of cybersecurity pros in the marketplace today, a new Juniper Networks report suggests that security automation is potentially the solution. Read More
Image of man using finger to control futuristic display sirnifying use of cyber security automation to battle against hackers
Cyber SecurityInsights

Cyber Security Automation Is One Key Factor in Winning the Battle Against Hackers

April 5, 2018
Given a shortage of skilled cyber security manpower, one of the most attractive alternatives may be cyber security automation. In a new report from McAfee, 81% of those surveyed said they would be more successful in their jobs and have more time to focus on higher value-added tasks if they had greater automation. Read More

Latest

White steam flows from the huge cooling towers at power plant showing need to secure critical national infrastructure

Securing the Devices That Underpin Our Critical Infrastructure

Technology screen with abstract network patterns over downtown San Francisco skyscrapers showing net neutrality challenge by Internet providers

2018 California Net Neutrality Law Finally Clear to Be Enforced in Wake of Unsuccessful Challenge by Internet Providers

Developer coding at night showing application security issues

Application Security Backsliding, Over 70% of Organizations Say Their Portfolio Is More Vulnerable

Man holding tablet with people icons with locks showing data security for privacy strategy

Amping Data Security Can Boost Your Privacy Strategy

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

Follow us

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow us

© 2020 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
Start typing to see results or hit ESC to close
U.S. Data Breach Regulations EU GDPR Cyber Threat
See all results