Tackling Swivel Chair Syndrome

TechSpective Podcast Episode 142   Ajit Sancheti, General Manager of NG-SIEM at CrowdStrike recently joined me for an episode of the TechSpective Podcast. With years of experience in cybersecurity and as a ...
Anton’s Alert Fatigue: The Study

Anton’s Alert Fatigue: The Study

Mention “alert fatigue” to a SOC analyst. They would immediately recognize what you are talking about. Now, take your time machine to 2002. Find a SOC analyst (much fewer of those around, ...
Get the ultimate guide to UEBA systems to understand the UEBA security meaning and power of behavioral analytics in cybersecurity.

What is UEBA and How Does It Work?

UEBA Security Defined User and Entity Behavior Analytics (UEBA) is a security solution that monitors user activity and machine behavior within a corporate network. It uses statistical modeling and machine learning to ...
Application Detection and Response (ADR): A Game-changing SOC Analyst Tool | Contrast Security

Application Detection and Response (ADR): A Game-changing SOC Analyst Tool | Contrast Security

Paged at 3 a.m. again … we had another breach to respond to in the security operations center (SOC). While the incident response team was busy delegating roles and responsibilities, I was ...
Automation: The Catalyst for Effective Threat Detection Engineering

How Security Automation Platforms Streamline SOC Operations

| | SOC
The post How Security Automation Platforms Streamline SOC Operations appeared first on AI-enhanced Security Automation ...
NTT Data, platform, SOC, BOTS SOC Open Systems Palo Alto Kaspersky zScaler

NTT Data Taps Palo Alto Networks for MXDR Service

| | AI, Cybersecurity, MSSP, SOC
NTT Data today added a managed extended detection and response (MXDR) service that is based on a security operations center (SOC) platform from Palo Alto Networks ...
Security Boulevard
Application Layer Security: ADR Brings the Application Layer into Cybersecurity Monitoring and Response | Contrast Security

Application Layer Security: ADR Brings the Application Layer into Cybersecurity Monitoring and Response | Contrast Security

At long last, there’s a spotlight — Application Detection and Response (ADR) — that shines the light into what’s been a blindspot: namely, the application layer.  ...
What is a SOC playbook? What are common SOC playbook examples? Learn these answers and how your organization can utilize SOC playbooks with Swimlane.

The Role of SOC Playbooks in Modern Cybersecurity Strategies

The post The Role of SOC Playbooks in Modern Cybersecurity Strategies appeared first on AI-enhanced Security Automation ...
SMBs, SOCs, SOCs, false positives, SOC

The New Era of SOCs: Simplifying Cybersecurity for SMBs

| | Cybersecurity, EDR, SIEM, smb, SOC
A new wave of all-in-one SOC platforms is consolidating the market, bringing enterprise-grade security solutions within reach of SMBs ...
Security Boulevard
Data Schema and the Rosetta Stone of the SOC

Data Schema and the Rosetta Stone of the SOC

| | SOC
The post Data Schema and the Rosetta Stone of the SOC appeared first on AI-enhanced Security Automation ...