What are Cloud Security Posture Management (CSPM) software solutions, and how might they mitigate risk for MSSPs & customers? KuppingerCole offers perspectives.
There are three phases to a cyber incident: (1) Events that led up to the incident, (2) the incident itself & (3) what happens after the incident. KuppingerCole explains best practices for each phase.
What the big cybersecurity trends -- including artificial intelligence, zero trust, insider threat management, continuous authentication and culture building -- really mean.
Cyber security products collect vast amounts of data. But finding so-called IOCS (Indicators of Compromise) is a challenge. Can artificial intelligence & machine learning help?