Security
Headlines
HeadlinesLatestCVEs

Headline

Red Hat Shares – Security automation

<p><em>The Red Hat Shares newsletter helps IT leaders navigate the complicated world of IT―the open source way.</em></p>

<div class="rc-cta-primary"><a href="https://www.redhat.com/en/email-preferences?newsletter=RH-shares&intcmp=7013a0000034h0bAAA">Subscribe to Red Hat Shares</a></div>

<hr /> <div class="rc-title-emphasis">FROM THE EDITOR</div>

<h3>De

Red Hat Blog
#vulnerability#web#ios#google#red_hat#git#intel#ibm

The Red Hat Shares newsletter helps IT leaders navigate the complicated world of IT―the open source way.

FROM THE EDITOR

Detect and deter threats faster with security automation

When a mobile game platform loosened security procedures to accommodate more users, it exposed players to a theft of US$615 million in cryptocurrency. Ransomware that gained entry to an oil pipeline’s digital systems via an unprotected password led to widespread fuel shortages, panic buying and multimillion-dollar losses. Again and again, cybercriminals exploit vulnerabilities in people and systems, causing damage to finances, reputations and everyone connected to the targets.

With human error accounting for 95% of security breaches and costs associated with cybercrime predicted to reach US$8 trillion globally in 2023 according to Cybersecurity Ventures, manual detection and responses aren’t enough. The threat landscape has grown too complex; having to process and prioritize potentially thousands of security data points at any given moment can overwhelm even the most capable IT teams. According to a 2022 IBM report, it takes nine months on average “to identify and contain a breach.”

Security automation—the use of technology, tools and processes to automate security tasks—offers greater protection against increasingly sophisticated strikes and can reduce response times from days to hours. The IBM report notes that breaches for "organizations using AI and automation” were 74 days shorter and an average of US$3 million less costly.

Technologies like Red Hat Ansible Automation Platform (recently made available on Google Cloud) provide rapid intelligence and defense. But effectively implementing systemwide security automation also requires a shift in strategy, skills and mindset.

IT leaders seem to be making that shift. Red Hat’s 2023 Global Tech Outlook survey identifies security automation as the top automation priority. E.G. Nadhan, Global Chief Architect Leader at Red Hat, says “forward-thinking enterprises who have a laser focus on proactive remediation will bring automation … into enterprise security to further reduce risk.”

In this issue of Red Hat Shares, learn about why you should consider security automation; tips for thinking through cost, design and implementation; how Emory University mitigated a security threat with a Red Hat automation solution and more. Plus, get links to a few ways to test out Ansible Automation Platform at no cost.

First, see why now is the time to prioritize security automation:

Security automation: What does it mean, and how do I get there?

Securing system architecture through automation requires new skills and new ways of thinking.

You may also be interested in “Security automation: 3 key benefits.”

Security automation: 4 factors to consider

Before you talk strategy, you need to talk numbers. The cost conversation dictates how organizations use automation—or whether they use it at all.

You may also be interested in “Security automation: 3 priorities for CIOs.”

5 ways to improve security automation

Consider these tips when designing security solutions to make them as effective and painless as possible.

IT solutions and security integration in changing environments

Fully deploying security automation can reduce the average cost of a security breach by 95%. In this on-demand webinar, learn how Ansible Automation Platform can contribute to investigation enrichment, threat hunting and incident response.

Build a foundation of security with Zero Trust and automation

With growing threats and attack vectors, implementing Zero Trust across your organization is a must. But that’s only the beginning—especially in large organizations with multiple sites and a mix of on-premise, cloud and edge systems. Scaling Zero Trust architecture requires enterprise-level automation.

CUSTOMER SPOTLIGHT

Emory University mitigates sudo threat with Red Hat

Find out how, after discovering a security vulnerability that needed to be addressed quickly, the university used Ansible Automation Platform to remediate across more than 500 servers in four hours instead of up to two weeks.

Experiment with Red Hat Ansible Automation Platform at no cost

2 events in 1: AnsibleFest is happening at Red Hat Summit

Our premier events will be held together, giving you more ways to explore what’s next in open source and automation.

May 23-25, 2023 | Boston, Massachusetts, USA

Register now

Did you miss our special end-of-year edition? Check it out. Or browse all past issues of Red Hat Shares.

Questions or comments about Red Hat Shares? It’s your turn to share. Email us.

Did a friend forward this email to you? Get your own subscription.

Red Hat Blog: Latest News

Automatically acquire and renew certificates using mod_md and Automated Certificate Management Environment (ACME) in Identity Management (IdM)