The Red Hat Shares newsletter helps IT leaders navigate the complicated world of IT―the open source way.
Detect and deter threats faster with security automation
When a mobile game platform loosened security procedures to accommodate more users, it exposed players to a theft of US$615 million in cryptocurrency. Ransomware that gained entry to an oil pipeline’s digital systems via an unprotected password led to widespread fuel shortages, panic buying and multimillion-dollar losses. Again and again, cybercriminals exploit vulnerabilities in people and systems, causing damage to finances, reputations and everyone connected to the targets.
With human error accounting for 95% of security breaches and costs associated with cybercrime predicted to reach US$8 trillion globally in 2023 according to Cybersecurity Ventures, manual detection and responses aren’t enough. The threat landscape has grown too complex; having to process and prioritize potentially thousands of security data points at any given moment can overwhelm even the most capable IT teams. According to a 2022 IBM report, it takes nine months on average “to identify and contain a breach.”
Security automation—the use of technology, tools and processes to automate security tasks—offers greater protection against increasingly sophisticated strikes and can reduce response times from days to hours. The IBM report notes that breaches for "organizations using AI and automation” were 74 days shorter and an average of US$3 million less costly.
Technologies like Red Hat Ansible Automation Platform (recently made available on Google Cloud) provide rapid intelligence and defense. But effectively implementing systemwide security automation also requires a shift in strategy, skills and mindset.
IT leaders seem to be making that shift. Red Hat’s 2023 Global Tech Outlook survey identifies security automation as the top automation priority. E.G. Nadhan, Global Chief Architect Leader at Red Hat, says “forward-thinking enterprises who have a laser focus on proactive remediation will bring automation … into enterprise security to further reduce risk.”
In this issue of Red Hat Shares, learn about why you should consider security automation; tips for thinking through cost, design and implementation; how Emory University mitigated a security threat with a Red Hat automation solution and more. Plus, get links to a few ways to test out Ansible Automation Platform at no cost.
First, see why now is the time to prioritize security automation:
Security automation: What does it mean, and how do I get there?
Securing system architecture through automation requires new skills and new ways of thinking.
You may also be interested in “Security automation: 3 key benefits.”
Security automation: 4 factors to consider
Before you talk strategy, you need to talk numbers. The cost conversation dictates how organizations use automation—or whether they use it at all.
You may also be interested in “Security automation: 3 priorities for CIOs.”
5 ways to improve security automation
Consider these tips when designing security solutions to make them as effective and painless as possible.
IT solutions and security integration in changing environments
Fully deploying security automation can reduce the average cost of a security breach by 95%. In this on-demand webinar, learn how Ansible Automation Platform can contribute to investigation enrichment, threat hunting and incident response.
Build a foundation of security with Zero Trust and automation
With growing threats and attack vectors, implementing Zero Trust across your organization is a must. But that’s only the beginning—especially in large organizations with multiple sites and a mix of on-premise, cloud and edge systems. Scaling Zero Trust architecture requires enterprise-level automation.
Emory University mitigates sudo threat with Red Hat
Find out how, after discovering a security vulnerability that needed to be addressed quickly, the university used Ansible Automation Platform to remediate across more than 500 servers in four hours instead of up to two weeks.
Experiment with Red Hat Ansible Automation Platform at no cost
Did you miss our special end-of-year edition? Check it out. Or browse all past issues of Red Hat Shares.
Sobre el autor
The Red Hat Shares team comprises content strategists who work with lots of smart subject matter experts. Together, we curate content on emerging tech topics your enterprise needs to learn about to stay competitive.
Navegar por canal
Automatización
Las últimas novedades en la automatización de la TI para los equipos, la tecnología y los entornos
Inteligencia artificial
Descubra las actualizaciones en las plataformas que permiten a los clientes ejecutar cargas de trabajo de inteligecia artificial en cualquier lugar
Nube híbrida abierta
Vea como construimos un futuro flexible con la nube híbrida
Seguridad
Vea las últimas novedades sobre cómo reducimos los riesgos en entornos y tecnologías
Edge computing
Conozca las actualizaciones en las plataformas que simplifican las operaciones en el edge
Infraestructura
Vea las últimas novedades sobre la plataforma Linux empresarial líder en el mundo
Aplicaciones
Conozca nuestras soluciones para abordar los desafíos más complejos de las aplicaciones
Programas originales
Vea historias divertidas de creadores y líderes en tecnología empresarial
Productos
- Red Hat Enterprise Linux
- Red Hat OpenShift
- Red Hat Ansible Automation Platform
- Servicios de nube
- Ver todos los productos
Herramientas
- Training y Certificación
- Mi cuenta
- Soporte al cliente
- Recursos para desarrolladores
- Busque un partner
- Red Hat Ecosystem Catalog
- Calculador de valor Red Hat
- Documentación
Realice pruebas, compras y ventas
Comunicarse
- Comuníquese con la oficina de ventas
- Comuníquese con el servicio al cliente
- Comuníquese con Red Hat Training
- Redes sociales
Acerca de Red Hat
Somos el proveedor líder a nivel mundial de soluciones empresariales de código abierto, incluyendo Linux, cloud, contenedores y Kubernetes. Ofrecemos soluciones reforzadas, las cuales permiten que las empresas trabajen en distintas plataformas y entornos con facilidad, desde el centro de datos principal hasta el extremo de la red.
Seleccionar idioma
Red Hat legal and privacy links
- Acerca de Red Hat
- Oportunidades de empleo
- Eventos
- Sedes
- Póngase en contacto con Red Hat
- Blog de Red Hat
- Diversidad, igualdad e inclusión
- Cool Stuff Store
- Red Hat Summit