Category: Security Orchestration

  • Engineering Data-Driven Secure Software Services

    Big Data Systems (BDS) (i.e., data-intensive applications) have become one of the key priority areas for all sorts of organizations. We have been conducting R&D on different aspects of Data intensive applications in general and on security oriented solutions in particular. A significant part of our research is aimed at inventing new and innovative techniques…

  • Adaptive Architectures for Cyber Security Analytics Systems

    It is becoming quite hard to imagine software systems that wouldn’t need adaptation as part of their runtime requirements. With the increasing demand for adaptivity by design, the knowledge and skills in this area are lagging far behind. Cyber Analytics systems are a new breed of systems that combine big data technologies and cyber security…

  • A Systematic Horizon Scan of Security Orchestration Approaches and Tools

    An increasing number of organisations focusing on security orchestration approaches and solutions to automate the processes of their Security Operation Centre (SOC). There are hundreds of approaches and tools to support security orchestration, hence, practitioners find it hard to access a consolidated material on the available solutions and researchers are unable to figure out the…