Not a SOC FAQ! This is SOC FMD!

Not a SOC FAQ! This is SOC FMD!

Somebody asked me this profound question that (a) I feel needs an answer and that (b) I’ve never answered in the past:If you run a SOC (or an equivalent D&R team), what things ...
Fernao Magellan Saves 70% of Time with Swimlane Security Automation

How fernao magellan Customized 140 Automation Use Cases

| | Customers, secops
The post How fernao magellan Customized 140 Automation Use Cases appeared first on AI-enhanced Security Automation ...
AHEAD Reduces Alerts by 30% with Swimlane Turbine

How AHEAD Enhanced SecOps Efficiency with Low-code Security Automation

| | Customers, low-code, secops
The post How AHEAD Enhanced SecOps Efficiency with Low-code Security Automation appeared first on AI-enhanced Security Automation ...
Risk and Reward of APIs and Third-Party Connectors in the Cloud

Risk and Reward of APIs and Third-Party Connectors in the Cloud

Risk and Reward of APIs and Third-Party Connectors in the Cloud7 min read·Just now--A Security Operations (#SecOps) and Engineering Commentary from industry insider Rohan Bafna , SecOps Engineer.Third-party connectors through an Application ...
Learn Modern SOC and D&R Practices Using Autonomic Security Operations (ASO) Principles

Learn Modern SOC and D&R Practices Using Autonomic Security Operations (ASO) Principles

Learn Modern SOC and D&R practices for free from Google! Yes, really! That’s the message. Join *hundreds* of others who already signed up!Now, with full details….After some ungodly amount of work, the original ...
cyberattacks, attacks, malware, environment data cyberattacks defend wiper hermeticwiper malware wiper file systems storage Zerologon

Cyberattack Rate Surges as Novel Malware Growth Accelerates

The rate of cyberattacks is rising as the threat level continues to evolve, according to BlackBerry Limited’s latest Global Threat Intelligence Report ...
Security Boulevard
Five Signs You’re Using “Good Enough” Automation

Five Signs You’re Using “Good Enough” Automation

The post Five Signs You’re Using “Good Enough” Automation appeared first on AI Enabled Security Automation ...
We Love What’s Broken … Yes, This Of Course Means SIEM!

We Love What’s Broken … Yes, This Of Course Means SIEM!

We Love What’s Broken … Yes, This Of Course Means SIEM!SIEM challenges never stopped me from loving this technology, but I am very cognizant of YMMV. Anyhow, CardinalOps released their annual “state of SIEM” ...
how will ai affect cybersecurity

Will AI Take Over Cybersecurity Jobs?

The post Will AI Take Over Cybersecurity Jobs? appeared first on AI Enabled Security Automation ...
blurry hand

SecOps Teams Shift Strategy as AI-Powered Threats, Deepfakes Evolve 

An escalation in AI-based attacks requires security operations leaders to change cybersecurity strategies to defend against them. The study found 61% of respondents had experienced a deepfake incident in the past year, ...
Security Boulevard

Application Security Check Up