SOC
Tackling Swivel Chair Syndrome
TechSpective Podcast Episode 142 Ajit Sancheti, General Manager of NG-SIEM at CrowdStrike recently joined me for an episode of the TechSpective Podcast. With years of experience in cybersecurity and as a ...

Anton’s Alert Fatigue: The Study
Mention “alert fatigue” to a SOC analyst. They would immediately recognize what you are talking about. Now, take your time machine to 2002. Find a SOC analyst (much fewer of those around, ...

What is UEBA and How Does It Work?
UEBA Security Defined User and Entity Behavior Analytics (UEBA) is a security solution that monitors user activity and machine behavior within a corporate network. It uses statistical modeling and machine learning to ...

Application Detection and Response (ADR): A Game-changing SOC Analyst Tool | Contrast Security
Paged at 3 a.m. again … we had another breach to respond to in the security operations center (SOC). While the incident response team was busy delegating roles and responsibilities, I was ...

How Security Automation Platforms Streamline SOC Operations
The post How Security Automation Platforms Streamline SOC Operations appeared first on AI-enhanced Security Automation ...

NTT Data Taps Palo Alto Networks for MXDR Service
NTT Data today added a managed extended detection and response (MXDR) service that is based on a security operations center (SOC) platform from Palo Alto Networks ...

Application Layer Security: ADR Brings the Application Layer into Cybersecurity Monitoring and Response | Contrast Security
At long last, there’s a spotlight — Application Detection and Response (ADR) — that shines the light into what’s been a blindspot: namely, the application layer. ...

The Role of SOC Playbooks in Modern Cybersecurity Strategies
The post The Role of SOC Playbooks in Modern Cybersecurity Strategies appeared first on AI-enhanced Security Automation ...

The New Era of SOCs: Simplifying Cybersecurity for SMBs
A new wave of all-in-one SOC platforms is consolidating the market, bringing enterprise-grade security solutions within reach of SMBs ...

Data Schema and the Rosetta Stone of the SOC
The post Data Schema and the Rosetta Stone of the SOC appeared first on AI-enhanced Security Automation ...