The Red Hat Shares newsletter helps IT leaders navigate the complicated world of IT―the open source way.
Detect and deter threats faster with security automation
When a mobile game platform loosened security procedures to accommodate more users, it exposed players to a theft of US$615 million in cryptocurrency. Ransomware that gained entry to an oil pipeline’s digital systems via an unprotected password led to widespread fuel shortages, panic buying and multimillion-dollar losses. Again and again, cybercriminals exploit vulnerabilities in people and systems, causing damage to finances, reputations and everyone connected to the targets.
With human error accounting for 95% of security breaches and costs associated with cybercrime predicted to reach US$8 trillion globally in 2023 according to Cybersecurity Ventures, manual detection and responses aren’t enough. The threat landscape has grown too complex; having to process and prioritize potentially thousands of security data points at any given moment can overwhelm even the most capable IT teams. According to a 2022 IBM report, it takes nine months on average “to identify and contain a breach.”
Security automation—the use of technology, tools and processes to automate security tasks—offers greater protection against increasingly sophisticated strikes and can reduce response times from days to hours. The IBM report notes that breaches for "organizations using AI and automation” were 74 days shorter and an average of US$3 million less costly.
Technologies like Red Hat Ansible Automation Platform (recently made available on Google Cloud) provide rapid intelligence and defense. But effectively implementing systemwide security automation also requires a shift in strategy, skills and mindset.
IT leaders seem to be making that shift. Red Hat’s 2023 Global Tech Outlook survey identifies security automation as the top automation priority. E.G. Nadhan, Global Chief Architect Leader at Red Hat, says “forward-thinking enterprises who have a laser focus on proactive remediation will bring automation … into enterprise security to further reduce risk.”
In this issue of Red Hat Shares, learn about why you should consider security automation; tips for thinking through cost, design and implementation; how Emory University mitigated a security threat with a Red Hat automation solution and more. Plus, get links to a few ways to test out Ansible Automation Platform at no cost.
First, see why now is the time to prioritize security automation:
Security automation: What does it mean, and how do I get there?
Securing system architecture through automation requires new skills and new ways of thinking.
You may also be interested in “Security automation: 3 key benefits.”
Security automation: 4 factors to consider
Before you talk strategy, you need to talk numbers. The cost conversation dictates how organizations use automation—or whether they use it at all.
You may also be interested in “Security automation: 3 priorities for CIOs.”
5 ways to improve security automation
Consider these tips when designing security solutions to make them as effective and painless as possible.
IT solutions and security integration in changing environments
Fully deploying security automation can reduce the average cost of a security breach by 95%. In this on-demand webinar, learn how Ansible Automation Platform can contribute to investigation enrichment, threat hunting and incident response.
Build a foundation of security with Zero Trust and automation
With growing threats and attack vectors, implementing Zero Trust across your organization is a must. But that’s only the beginning—especially in large organizations with multiple sites and a mix of on-premise, cloud and edge systems. Scaling Zero Trust architecture requires enterprise-level automation.
Emory University mitigates sudo threat with Red Hat
Find out how, after discovering a security vulnerability that needed to be addressed quickly, the university used Ansible Automation Platform to remediate across more than 500 servers in four hours instead of up to two weeks.
Experiment with Red Hat Ansible Automation Platform at no cost
Did you miss our special end-of-year edition? Check it out. Or browse all past issues of Red Hat Shares.
Sull'autore
The Red Hat Shares team comprises content strategists who work with lots of smart subject matter experts. Together, we curate content on emerging tech topics your enterprise needs to learn about to stay competitive.
Ricerca per canale
Automazione
Novità sull'automazione IT di tecnologie, team e ambienti
Intelligenza artificiale
Aggiornamenti sulle piattaforme che consentono alle aziende di eseguire carichi di lavoro IA ovunque
Hybrid cloud open source
Scopri come affrontare il futuro in modo più agile grazie al cloud ibrido
Sicurezza
Le ultime novità sulle nostre soluzioni per ridurre i rischi nelle tecnologie e negli ambienti
Edge computing
Aggiornamenti sulle piattaforme che semplificano l'operatività edge
Infrastruttura
Le ultime novità sulla piattaforma Linux aziendale leader a livello mondiale
Applicazioni
Approfondimenti sulle nostre soluzioni alle sfide applicative più difficili
Serie originali
Raccontiamo le interessanti storie di leader e creatori di tecnologie pensate per le aziende
Prodotti
- Red Hat Enterprise Linux
- Red Hat OpenShift
- Red Hat Ansible Automation Platform
- Servizi cloud
- Scopri tutti i prodotti
Strumenti
- Formazione e certificazioni
- Il mio account
- Supporto clienti
- Risorse per sviluppatori
- Trova un partner
- Red Hat Ecosystem Catalog
- Calcola il valore delle soluzioni Red Hat
- Documentazione
Prova, acquista, vendi
Comunica
- Contatta l'ufficio vendite
- Contatta l'assistenza clienti
- Contatta un esperto della formazione
- Social media
Informazioni su Red Hat
Red Hat è leader mondiale nella fornitura di soluzioni open source per le aziende, tra cui Linux, Kubernetes, container e soluzioni cloud. Le nostre soluzioni open source, rese sicure per un uso aziendale, consentono di operare su più piattaforme e ambienti, dal datacenter centrale all'edge della rete.
Seleziona la tua lingua
Red Hat legal and privacy links
- Informazioni su Red Hat
- Opportunità di lavoro
- Eventi
- Sedi
- Contattaci
- Blog di Red Hat
- Diversità, equità e inclusione
- Cool Stuff Store
- Red Hat Summit