It doesn’t have to. We just need to apply the compensating safeguards and automated controls selectively so CISOs and their security teams can comfortably embrace it. Although many CISOs see automation as a necessity to deal with limited resources and increasing workloads, there is a lingering reticence to adopt it widely because their security staff […]

This post, the first of two parts, was written by Raj Samani, Christiaan Beek, and Shane Shook.  Want to spread malware? One of the most effective ways is to use a botnet, a network of infected systems. The goals of botnets have barely changed since we first encountered them more than a decade ago. We […]

The holiday season is upon us, and for many its time to stock up on gifts. Seasonal sales are eagerly anticipated – so much so, that you may have both Black Friday and Cyber Monday highlighted on your calendars. So what should you know as you ready your wallet in the coming weeks? It turns […]

On behalf of the Intel Security Channel Team, I’d like to extend a huge “thank you” to over 400 channel partners who joined us in making this year’s Global Partner Summit the best yet. Attendees got a preview of what’s new and what’s next as Intel Security executives unveiled our evolved corporate strategy focusing on […]

Cyber threats have evolved over time to communicate, cooperate, and in some cases directly collaborate among themselves, giving them a distinct advantage over their security counterparts. Hackers possess a culture that is comparatively open, mutually supportive, and largely opportunistic. This has in part contributed to their ability to outpace their security-minded adversaries. This cooperation is an advantage […]