Security Operations

Financial fraud and cyber-crime: Can banks stay one step ahead?

There seems to be no shortage of news around cybercrime and fraud at financial services institutions.  The latest involves a...

Patch Smarter with Vulnerability Response

Vulnerabilities don’t often get the same amount of notice as phishing attacks or advanced persistent threats, but when a critical...

ServiceNow is a Leader in Integrated Risk Management

I am excited to tell you that ServiceNow has been named a Leader in the inaugural Gartner Magic Quadrant for...

Survey: Hiring More Talent Alone Won’t Solve Security’s Woes

Major data breaches are headline news. When criminals steal corporate data or personally identifiable information (PII), it can create a...

UK government cloud health: setting the standard for delivery

By Darren James, Office of the CISO, EMEA, ServiceNow  As a government entity with its own public sector ministry and related...

Reactions and Advice following the 2018 Scalar Security Study

Just like the three previous years, the 2018 Scalar Security Study and the resulting Cyber Security Readiness of Canadian Organizations...

Work Smarter: Forrester Consulting Study Reports the Value of ServiceNow Security Operations

Everyone wants metrics and key performance indicators to prove things are going well. But when it comes to value, that...

The CISO’s 2018 Resolution: Security Orchestration and Automation

The CISO’s 2018 Resolution: Security Orchestration and Automation

It’s that time of the year again when we set resolutions to create better communities and selves. Many of us...

How ServiceNow uses Security Operations to Deliver 6X Faster Processing via Automation and Integration

At security conferences, technologies like artificial intelligence and machine learning are often in the spotlight. But for security operations teams,...

ServiceNow 2018 Security Predictions: Automation, Boardrooms and GDPR

The security threats and breaches of 2017 have set astounding new records for personal data invasion.  From WannaCry to Petya,...

1 2