Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

New security tools from Tenable, HP, Co3 attempt the impossible

By John Breeden II | Aug. 12, 2014
Automated incident response is one of the fastest growing fields in computer security. Alternatively called threat monitoring, vulnerability management or threat management, it encompasses the seemingly impossible task of defending a network from active threats as they happen, in addition to detecting every possible vulnerability that could be exploited by an attacker.

Although the Co3 Security Module probably isn't ready to become the only security platform a company should implement, having it in place can streamline a lot of the sometimes chaotic activity that occurs after an attack, and can also help to ensure the least amount of legal vulnerability, especially when dealing with personal or healthcare related information. Given that it's after an attack when most of the companies involved in recent high-profile data breaches have stumbled badly, having a built-in plan ready for almost any eventuality isn't a bad thing at all.

John Breeden II has been covering and speaking about technology for more than 20 years. He was the lab director of product testing for Government Computer News magazine for the past decade. Today he's the president of the Tech Writer's Bureau, a group of influential journalists that pen interesting technology stories and analysis pieces for a variety of publications and companies. He can be reached at johnbreeden@comcast.net.

 

Previous Page  1  2  3  4  5  6  7 

Sign up for CIO Asia eNewsletters.