AI brings speed to security
Survey results indicate incident response times improve with AI-based security services.
Insights, tools, and best practices to keep your organization and users secure.
Survey results indicate incident response times improve with AI-based security services.
A new survey highlights concerns from network and cloud administrators, and reveals their coping strategies.
Use cases of AI and ML to help businesses build better defenses today and in the near future.
The O’Reilly Podcast: Protecting your organization against current and future threats.
Utilizing machine intelligence to facilitate proactive cybersecurity operations.
Optimizing your NGINX setup with a tuned ModSecurity / Core Rule Set installation.
How to find the best Software Composition Analysis (SCA) for your organization
Best practices for quick remediation and response
Testing to prevent vulnerable open source libraries.
Fixing vulnerable open source packages.
When and how to test your application for open source vulnerabilities.
Understanding known vulnerabilities in open source packages.
The O’Reilly Defender Awards celebrate those who have demonstrated exceptional leadership, creativity, and collaboration in the defensive security field.
Matt Stine looks at three principles of cloud-native security and explains an approach that addresses the increasing volume and velocity of threats.
The case for chatbots in the modern security operations center.
Chris Baker on an economic model for deterring attacks.
Jessy Irwin on making security make sense for nontechnical users.
Five questions for Josiah Dykstra on techniques to expose and invalidate misleading claims.
Are we out of the woods?
Five questions for Charles Givre on building effective security analytics programs.
Carrying on Becky Bace’s legacy of encouraging and celebrating defenders.
Bruce Potter on why and how to build a risk assessment program.
Don't overcomplicate cybersecurity. Focus on building a strong security foundation and go from there.
Exploring the disconnect between security wisdom and user realities.