Introducing Incidentally: Why We Must Embrace Risk and Learn From Incidents

Progress demands risk, and incidents are inevitable. Based on 25 years of personal experience, Incidentally will explore the role of risk in driving success, particularly in cybersecurity, and how we can manage ...
A screenshot of Smart SOAR's playbook editor with the internal CVE search workflow

Threat Hunting in Smart SOAR

In modern cybersecurity operations, threat hunting has become an essential proactive defense strategy. Leveraging Security Orchestration, Automation, and Response (SOAR) playbooks enhances this activity, making it more efficient and effective. This blog ...
A screenshot of Smart SOAR's playbook editor with the internal CVE search workflow

Threat Hunting in Smart SOAR

In modern cybersecurity operations, threat hunting has become an essential proactive defense strategy. Leveraging Security Orchestration, Automation, and Response (SOAR) playbooks enhances this activity, making it more efficient and effective. This blog ...
Bi-directional Sync with Microsoft Sentinel - Smart SOAR's Trigger Workflows

Bi-Directional Sync with Microsoft Sentinel and Smart SOAR

Managed security service providers (MSSPs) and organizations that oversee multiple security teams will often have to manage multiple tenants of Microsoft Sentinel. In this situation, it’s inefficient and overwhelming to switch between ...
[AlienVault +D3 Smart SOAR] Automate Your Security Alerts

Automated Incident Response with AlienVault and Smart SOAR

Open-source threat intelligence (OSINT) is a valuable asset to pull from during incident investigations. However, doing this for every alert is monotonous and can be prone to human errors. When using SOAR ...
data, Rubrik, Cisco, FTC Cerebral data security

Blameless Locks Down Security Incident Management Over Slack

Blameless is making it simpler for security operations teams to manage multiple conversations and security incidents across Slack ...
Security Boulevard
team, enterprise, remediation response crisis

It’s Time to Reevaluate Your Enterprise Remediation Strategy

In the world of cyberattack response and recovery, timing is everything. Attacks discovered quickly are likely in their early phase. That’s when the odds of recovering affected assets, undoing whatever damage has ...
Security Boulevard

CIS Control 17: Incident Response Management

We all know that it is a question of when you will be compromised and not if you will be compromised. It is unavoidable. The goal of CIS Control 17 is to ...
Incident Management: Benefits, KPIs and Best Practices

Incident Management: Benefits, KPIs and Best Practices

| | incident management, ITIL, ITSM
What is incident management? Incident management is basically a process of IT service management or ITSM that is designed withRead More The post Incident Management: Benefits, KPIs and Best Practices appeared first ...

Countering Cybercrime in the Next Normal

Guest post By Tom Kellermann, Head of Cybersecurity Strategy, VMware Carbon BlackCOVID-19 has reshaped the global cyberthreat landscape. While cyberattacks have been on the rise, the surge in frequency and increased threat ...