Moving from Overwhelmed to Empowered
The Gartner Security & Risk Management Summit is on in National Harbor, MD this week. Monday's keynote opened with how organizations can go from being overwhelmed (by a lack of staff, too much securit...
The Gartner Security & Risk Management Summit is on in National Harbor, MD this week. Monday's keynote opened with how organizations can go from being overwhelmed (by a lack of staff, too much securit...
How are you responding to and remediating vulnerabilities on your network? Are you confident that you're finding and remediating critical vulnerabilities in a timely fashion? If your answer is "No," y...
"Enterprises are striving to keep up with the current threat landscape with too many manual processes, while struggling with a lack of resources, skills and budgets. Security and risk management leade...
Read The Total Economic ImpactTM of ServiceNow Security Operations, a January 2018 commissioned study conducted by Forrester Consulting on behalf of ServiceNow, to see how security teams can be more e...
Configuration Compliance is a new application in the Kingston release and is part of ServiceNow's Enterprise Security Response suite.Configuration Compliance protects you from security vulnerabilities...
While there's no vaccine against malware, taking the right preventative measures can have a similar effect. In healthcare, herd immunity means "when a critical portion of a community is immunized agai...
I've been spending a lot of time talking to customers over the last few weeks and I've heard a ton of great use cases for our Security Operations product. Let me share a great one right now. If you've...
Don't Panic! The words written on the cover of the Hitchhikers Guide to the Galaxy - It's a good thing, too, because the sheer volume of information required to hitchhike across galaxies would be pret...
Piecemeal cybersecurity programs are not only costly to maintain, they can introduce business-disruptive risks to your organization. In my experience, CISOs and CROs who start with the end in mind hav...
"My friend, my friend (He's got a knife!)"Oh look, another email with an urgent message to change your bank password by clicking an embedded link…from a bank you don't even use. Phishing emails are a ...
Everywhere you look these days, security vendors are telling you to "automate or die." In fact, these vendors sometimes make it sound like automation will solve all your problems, calling it "adaptive...
Nearly a decade ago, my first ServiceNow project was integrating non-IT processes into onboarding/termination. Ever since, myself and others like me have pushed ServiceNow far beyond the realm of IT S...
We care deeply about keeping our data secure. Ensuring that you can only see what you are supposed to see, keeps us and your organization happy. The general perception about security and data is that ...
In the age of automation and productivity, we often overlook the security impact of automation (of everything). Since the release of Aspen, ServiceNow introduced inbound email actions, allowing Servic...