respurces_bg.png

Blog

Kim Crawley

Kim Crawley
Kim Crawley spent years working in general tier two consumer tech support, most of which as a representative of Windstream, a secondary American ISP. Malware-related tickets intrigued her, and her knowledge grew from fixing malware problems on thousands of client PCs. Her curiosity led her to research malware as a hobby, which grew into an interest in all things information security related. By 2011, she was already ghostwriting study material for the InfoSec Institute’s CISSP and CEH certification exam preparation programs. Ever since, she’s contributed articles on a variety of information security topics to CIO, CSO, Computerworld, SC Magazine, and 2600 Magazine.
Find me on:

Recent Posts

Security Automation Saves Money, Time and Work

Kim Crawley September 5, 2018

Security automation means a more efficient SOC, improving the bottom line

Security automation savings

The evolving threat landscape just gets more complex and brutal as time goes on. Targeted threats abound as advanced persistent threat campaigns, cyberwarfare, distributed denial of service attacks, and spearphishing. Meanwhile, zero-day vulnerabilities and exploits continue to be frequent occurrences. It’s a hostile cyber world out there, and it’s easy for organizations and enterprises to get overwhelmed. What if there was a solution that could be deployed that could cut down on the tedium that SOC analysts deal with? The right security automation tool can reduce your cases by 80%.

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.

Subscribe to Email Updates

Top Stories