CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Security Automation
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Security Automation

Industrial oil refinery plant showing cyber threats for critical infrastructure and need for security automation
Cyber SecurityInsights

Critical Infrastructure Companies Must Address Cyber Threats More Efficiently

June 15, 2022
The cyberattack on Colonial Pipeline was a big lesson. It is imperative that critical infrastructure companies uplevel their protection against modern security risks by using modern techniques and automation to comply with new cybersecurity regulations.
Read More
User in front of laptop with virtual lock showing need for certificate automation
Cyber SecurityInsights

Meeting Increasing Security Requirements Is Necessary. But Getting There Is Still Painful for Large Enterprises. The Solution? Automation

February 7, 2022
In the last few years Apple and other browsers have essentially demanded that all certificate authorities gradually reduce the lifecycle of digital certificates. To be able to replace tens of, or even hundreds of thousands, of certificates in a compressed time frame, on a regular basis, is going to be nearly impossible without automation solutions.
Read More
Hand reaching for glasses against backdrop of data showing security analysts working on security automation
Cyber SecurityNews

Burdened by False Positives, Security Analysts Report Increased Stress Created by Security Automation Tools

February 22, 2021
Security automation is increasingly becoming a necessity in order to keep up with the cyber threats, but security analysts report significant increased stress on the job driven by fear of missing alerts.
Read More
Gear virtual icons on data centre racks shows new study suggests security automation may cause substantial cybersecurity workforce reductions
Cyber SecurityNews

New Study Suggests Security Automation Will Cause Dramatic Improvements, but Also Substantial Cybersecurity Workforce Reductions

February 17, 2020
Even though organizations are expecting security automation to reduce their cybersecurity workforce, it also helps them to focus on overall network security and the most serious vulnerabilities.
Read More
Padlock symbol for system showing network security automation
Cyber SecurityInsights

Going Beyond Zero Touch Network Security Automation to Gain Full Business Innovation

December 9, 2019
By going beyond today’s version of “zero-touch” network security automation, enterprises gain real-time visibility and adaptive control over their network security operations, ultimately advancing business innovation and financial growth.
Read More
Control center for security automation without any cybersecurity pros
Cyber SecurityInsights

New Juniper Report Highlights Need for Security Automation and Additional Cybersecurity Pros

July 5, 2018
Given the dearth of cybersecurity pros in the marketplace today, a new Juniper Networks report suggests that security automation is potentially the solution.
Read More
Image of man using finger to control futuristic display sirnifying use of cyber security automation to battle against hackers
Cyber SecurityInsights

Cyber Security Automation Is One Key Factor in Winning the Battle Against Hackers

April 5, 2018
Given a shortage of skilled cyber security manpower, one of the most attractive alternatives may be cyber security automation. In a new report from McAfee, 81% of those surveyed said they would be more successful in their jobs and have more time to focus on higher value-added tasks if they had greater automation.
Read More

Latest

Man looking at SMS on phone showing robotext scams and smishing attacks

FCC Warns About Increased Robotext Scams From Automated Smishing Attacks

Twitter logo on mobile phone screen showing Twitter API keys used for account hijacking

Thousands of Mobile Apps Are Leaking Twitter API Keys, Could Be Used for Account Hijacking

Doctor monitoring patient using medical devices showing internet of medical things

Internet of Medical Threats? Exploring Bluetooth Low Energy Vulnerabilities in Medical Devices

Hand holding credit card showing remote control compromise of payment terminals

Hackers Reportedly Exploited Wiseasy’s Remote Control Dashboards to Compromise 140,000 Payment Terminals Worldwide

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results