A chart from D3 Security's 2024 MSSP Survey for the question - Which is the primary tool your organization uses for automation?

Is SOAR Obsolete?

Let’s look at the factors behind the push to declare the end of SOAR, consider their merits, and determine whether or not SOAR is obsolete. The post Is SOAR Obsolete? appeared first ...
A workflow diagram illustrating Smart SOAR's Rapid Enrichment System

Automate Tier 1 with Smart SOAR’s Rapid Enrichment System (RES)

Automate data collection, improve visibility, empower security teams with D3's Rapid Enrichment System (RES). Respond quickly & accurately to evolving threats. The post Automate Tier 1 with Smart SOAR’s Rapid Enrichment System ...
Leveraging Tabletop exercises to Enhance OT security maturity

Leveraging Tabletop exercises to Enhance OT security maturity

| | CISO, Incident Response, iot, OT, threats
Has your organization tested its OT security incident response plan in the last 6 months? Do you remember when you last checked your institutional OT security awareness levels? Are your OT security ...
Application Detection and Response (ADR): A Game-changing SOC Analyst Tool | Contrast Security

Application Detection and Response (ADR): A Game-changing SOC Analyst Tool | Contrast Security

Paged at 3 a.m. again … we had another breach to respond to in the security operations center (SOC). While the incident response team was busy delegating roles and responsibilities, I was ...
A screenshot of a Smart SOAR workflow to get device health reports.

How MSPs can Start Delivering Security Services with Automation

Learn how SOAR tools integrate with NinjaOne and CrowdStrike to deliver automated threat response and streamline MSP operations. The post How MSPs can Start Delivering Security Services with Automation appeared first on ...
Application Layer Security: ADR Brings the Application Layer into Cybersecurity Monitoring and Response | Contrast Security

Application Layer Security: ADR Brings the Application Layer into Cybersecurity Monitoring and Response | Contrast Security

At long last, there’s a spotlight — Application Detection and Response (ADR) — that shines the light into what’s been a blindspot: namely, the application layer.  ...
How to evaluate OT security program maturity

How to evaluate OT security program maturity

| | CISO, Incident Response, iot, OT, threats
An OT security program can lead to better resource use, improved security operations, and tangible gains for the security posture of an OT operator. The benefits of running an OT security program ...
Launching a critical infrastructure security program in 4 phases

Launching a critical infrastructure security program in 4 phases

| | CISO, Incident Response, iot, OT, threats
As per the Cybersecurity and Infrastructure Security Agency (CISA), threat actors were still leveraging brute force intrusions, default credentials, and other unsophisticated attack methods to target internet-exposed operational technology and industrial control ...
Simple yet essential cybersecurity strategies for ensuring robust OT security

Simple yet essential cybersecurity strategies for ensuring robust OT security

| | CISO, Incident Response, iot, OT, threats
At the heart of an OT security strategy lies the ability to clearly distinguish IT and OT security. Since both share tech, operational goals, and to some extent an enabling mission, it ...
Smart SOAR Deduplication workflow

A Modern Playbook for Ransomware

SOC teams need every advantage against ransomware. Learn how a SOAR playbook can streamline incident response, saving time and minimizing the impact of attacks. The post A Modern Playbook for Ransomware appeared ...