Search Results
Implement a Risk-Based Approach to Vulnerability Management

Organizations relying on traditional vulnerability management approaches often face common challenges: too many vulnerabilities, ineffective prioritization and wasted efforts on vulnerabilities posing little to no threat.

Securing the Hybrid Environment
Webinar: Securing the Hybrid Environment

As efforts are underway to migrate workloads to the cloud, highly complex infrastructures have taken shape spanning on-prem and multi-cloud networks.

Malicious Cryptomining & Other Shifting Threats

Skybox Security CMO Michelle Johnson Cobb discloses research results that include a spike in malicious cryptomining during Bitcoin’s peak, a shift to outside-the-perimeter mobile threats, and more.

Webinar: To Automate or Not... Is Not the Question - Where and How Is

Watch Michael D. Osterman, principal analyst of Osterman Research, as he goes through the findings of a new global survey sponsored by Skybox Security on automation in cybersecurity. 

Making the Modern Security Operations Center

The security operations center (SOC) faces mounting challenges: lack of personnel, disparate security tools, multiple alerts that must be run down, prioritization of alerts, and the transition between incident detection and incident response.

Understanding Security Processes and the Need to Automate

Read the Report written by Michael D. Osterman, president of Osterman Research, as he goes through the findings of a new global survey sponsored by Skybox Security on automation in cybersecurity.