Tag: soar
-
Don’t use ‘admin’: UK’s top 20 most-used passwords revealed as scams soar
Easy-to-guess words and figures still dominate, alarming cysbersecurity experts and delighting hackersIt is a hacker’s dream. Even in the face of repeated warnings to protect online accounts, a new study reveals that “admin” is the most commonly used password in the UK.The second most popular, “123456”, is also unlikely to keep hackers at bay. <a…
-
Hardening browser security with zero-trust controls
Tags: access, api, authentication, automation, browser, chrome, cisa, cloud, compliance, container, control, corporate, credentials, crowdstrike, data, data-breach, detection, edr, email, encryption, endpoint, exploit, fido, finance, framework, google, governance, group, Hardware, identity, kubernetes, least-privilege, login, malicious, malware, mfa, microsoft, network, nist, okta, passkey, password, phishing, phone, risk, risk-assessment, sap, service, soar, theft, threat, tool, update, wifi, windows, zero-trust1. Identity-first access control Network proximity is now an inferior trust signal. Only federated, cryptographically verifiable identity tokens issued by centralized enterprise IdPs using OIDC or SAML are permitted as gates to corporate resources. This transition, well-documented by FIDO Alliance and Microsoft research, transfers the very concept of “inside” the organization from the network to…
-
Key questions CISOs must ask before adopting AI-enabled cyber solutions
Questions to ask vendors about their AI security offerings: There are several areas where CISOs will want to focus their attention when considering AI-powered cyber solutions, including the following:Shadow AI: Uncovering and addressing shadow AI throughout the organization is a key issue for security leaders today. But so too is ensuring that sanctioned AI-enabled solutions…
-
Key questions CISOs must ask before adopting AI-enabled cyber solutions
Questions to ask vendors about their AI security offerings: There are several areas where CISOs will want to focus their attention when considering AI-powered cyber solutions, including the following:Shadow AI: Uncovering and addressing shadow AI throughout the organization is a key issue for security leaders today. But so too is ensuring that sanctioned AI-enabled solutions…
-
Key questions CISOs must ask before adopting AI-enabled cyber solutions
Questions to ask vendors about their AI security offerings: There are several areas where CISOs will want to focus their attention when considering AI-powered cyber solutions, including the following:Shadow AI: Uncovering and addressing shadow AI throughout the organization is a key issue for security leaders today. But so too is ensuring that sanctioned AI-enabled solutions…
-
The Most Common SOAR Use Cases
How SOAR platforms are used in (and beyond) the SOC First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/the-most-common-soar-use-cases-3/
-
How to turn threat intel into real security wins
Tags: access, api, attack, automation, awareness, business, ciso, cloud, communications, control, credentials, csf, data, data-breach, detection, dns, edr, email, endpoint, exploit, finance, framework, governance, guide, identity, intelligence, lessons-learned, mail, malware, mitre, nist, phishing, ransomware, resilience, risk, saas, siem, soar, soc, switch, tactics, theft, threat, tool, update, vulnerabilityThe CISO mandate: Risk, efficiency, investment, response: Reduce operational risk and financial loss Intelligence-led detection and response aim to prevent or minimise data loss and business disruption. The downstream effects, smaller blast radii, fewer regulatory headaches and lower recovery bills, are what boards recognise. Maximise staff efficiency Manual validation and correlation drive alert fatigue. Automating…
-
How to turn threat intel into real security wins
Tags: access, api, attack, automation, awareness, business, ciso, cloud, communications, control, credentials, csf, data, data-breach, detection, dns, edr, email, endpoint, exploit, finance, framework, governance, guide, identity, intelligence, lessons-learned, mail, malware, mitre, nist, phishing, ransomware, resilience, risk, saas, siem, soar, soc, switch, tactics, theft, threat, tool, update, vulnerabilityThe CISO mandate: Risk, efficiency, investment, response: Reduce operational risk and financial loss Intelligence-led detection and response aim to prevent or minimise data loss and business disruption. The downstream effects, smaller blast radii, fewer regulatory headaches and lower recovery bills, are what boards recognise. Maximise staff efficiency Manual validation and correlation drive alert fatigue. Automating…
-
Beyond silos: How DDI-AI integration is redefining cyber resilience
Tags: ai, api, attack, automation, best-practice, breach, business, cctv, cloud, control, corporate, cyber, cybersecurity, data, defense, detection, dns, endpoint, finance, firewall, guide, identity, infrastructure, intelligence, iot, malicious, monitoring, network, penetration-testing, phishing, phone, RedTeam, resilience, risk, service, siem, soar, soc, sql, threat, tool, training, zero-trustDDI as the nervous system of enterprise security: DDI, including DNS, DHCP and IP address management, is the nervous system of the network. It records every connection, every name resolution and every IP allocation, maintaining the only comprehensive, authoritative record of normal network behavior.By itself, DDI data is simply a massive stream of logs. For…
-
Beyond silos: How DDI-AI integration is redefining cyber resilience
Tags: ai, api, attack, automation, best-practice, breach, business, cctv, cloud, control, corporate, cyber, cybersecurity, data, defense, detection, dns, endpoint, finance, firewall, guide, identity, infrastructure, intelligence, iot, malicious, monitoring, network, penetration-testing, phishing, phone, RedTeam, resilience, risk, service, siem, soar, soc, sql, threat, tool, training, zero-trustDDI as the nervous system of enterprise security: DDI, including DNS, DHCP and IP address management, is the nervous system of the network. It records every connection, every name resolution and every IP allocation, maintaining the only comprehensive, authoritative record of normal network behavior.By itself, DDI data is simply a massive stream of logs. For…
-
Wie CISOs vom ERP-Leid profitieren
Tags: ai, best-practice, business, cio, cisco, ciso, cloud, crowdstrike, cybersecurity, fortinet, mail, microsoft, network, resilience, service, siem, soar, threat, toolSecurity Platformization ist eine Herausforderung gut, wenn man vorher weiß, worauf es (nicht) ankommt.Studienerkenntnissen zufolge sind in einem durchschnittlichen (Groß-)Unternehmen zwischen 40 und 80 separate Sicherheits-Tools im Einsatz. Wildwuchs dieser Art führt regelmäßig zu:Security-Datensilos,Integrationsproblemen,fortlaufendem Wartungs- und Konfigurationsaufwand, oderAlert-Müdigkeit.Angesichts dieser Herausforderungen (und dem Marktpotenzial für entsprechende Lösungen) haben diverse Security-Anbieter Technologieplattformen aufgebaut etwa Cisco, Crowdstrike, Fortinet,…
-
Wie CISOs vom ERP-Leid profitieren
Tags: ai, best-practice, business, cio, cisco, ciso, cloud, crowdstrike, cybersecurity, fortinet, mail, microsoft, network, resilience, service, siem, soar, threat, toolSecurity Platformization ist eine Herausforderung gut, wenn man vorher weiß, worauf es (nicht) ankommt.Studienerkenntnissen zufolge sind in einem durchschnittlichen (Groß-)Unternehmen zwischen 40 und 80 separate Sicherheits-Tools im Einsatz. Wildwuchs dieser Art führt regelmäßig zu:Security-Datensilos,Integrationsproblemen,fortlaufendem Wartungs- und Konfigurationsaufwand, oderAlert-Müdigkeit.Angesichts dieser Herausforderungen (und dem Marktpotenzial für entsprechende Lösungen) haben diverse Security-Anbieter Technologieplattformen aufgebaut etwa Cisco, Crowdstrike, Fortinet,…
-
Wie CISOs vom ERP-Leid profitieren
Tags: ai, best-practice, business, cio, cisco, ciso, cloud, crowdstrike, cybersecurity, fortinet, mail, microsoft, network, resilience, service, siem, soar, threat, toolSecurity Platformization ist eine Herausforderung gut, wenn man vorher weiß, worauf es (nicht) ankommt.Studienerkenntnissen zufolge sind in einem durchschnittlichen (Groß-)Unternehmen zwischen 40 und 80 separate Sicherheits-Tools im Einsatz. Wildwuchs dieser Art führt regelmäßig zu:Security-Datensilos,Integrationsproblemen,fortlaufendem Wartungs- und Konfigurationsaufwand, oderAlert-Müdigkeit.Angesichts dieser Herausforderungen (und dem Marktpotenzial für entsprechende Lösungen) haben diverse Security-Anbieter Technologieplattformen aufgebaut etwa Cisco, Crowdstrike, Fortinet,…
-
Wie CISOs vom ERP-Leid profitieren
Tags: ai, best-practice, business, cio, cisco, ciso, cloud, crowdstrike, cybersecurity, fortinet, mail, microsoft, network, resilience, service, siem, soar, threat, toolSecurity Platformization ist eine Herausforderung gut, wenn man vorher weiß, worauf es (nicht) ankommt.Studienerkenntnissen zufolge sind in einem durchschnittlichen (Groß-)Unternehmen zwischen 40 und 80 separate Sicherheits-Tools im Einsatz. Wildwuchs dieser Art führt regelmäßig zu:Security-Datensilos,Integrationsproblemen,fortlaufendem Wartungs- und Konfigurationsaufwand, oderAlert-Müdigkeit.Angesichts dieser Herausforderungen (und dem Marktpotenzial für entsprechende Lösungen) haben diverse Security-Anbieter Technologieplattformen aufgebaut etwa Cisco, Crowdstrike, Fortinet,…
-
CrowdStrike Unveils Agentic Security Expansion: 5 Things To Know
CrowdStrike debuted a major expansion to its Falcon Agentic Security offering while also introducing a new SOAR (security orchestration automation and response) platform powered by agentic technology. First seen on crn.com Jump to article: www.crn.com/news/security/2025/crowdstrike-unveils-agentic-security-expansion-5-things-to-know
-
Volvo’s recent security breach: 5 tips to speed incident response while preserving forensic integrity
Tags: access, automation, breach, business, cio, ciso, cloud, compliance, control, cyber, cybersecurity, data, data-breach, detection, endpoint, finance, framework, gartner, GDPR, guide, incident, incident response, insurance, metric, mitigation, nist, resilience, risk, risk-management, saas, security-incident, siem, soar, supply-chain, vulnerabilityIdentify and catalog your evidence sources in advance (endpoints, memory, logs, cloud assets)Stage scripts or agents that can snapshot memory and archive logs immediately when an IR trigger firesMake forensic collection part of containment, not something you tack on afterwardModern approaches and even NIST’s updated guidance emphasize that evidence gathering should begin during, not after,…
-
Volvo’s recent security breach: 5 tips to speed incident response while preserving forensic integrity
Tags: access, automation, breach, business, cio, ciso, cloud, compliance, control, cyber, cybersecurity, data, data-breach, detection, endpoint, finance, framework, gartner, GDPR, guide, incident, incident response, insurance, metric, mitigation, nist, resilience, risk, risk-management, saas, security-incident, siem, soar, supply-chain, vulnerabilityIdentify and catalog your evidence sources in advance (endpoints, memory, logs, cloud assets)Stage scripts or agents that can snapshot memory and archive logs immediately when an IR trigger firesMake forensic collection part of containment, not something you tack on afterwardModern approaches and even NIST’s updated guidance emphasize that evidence gathering should begin during, not after,…
-
Simple to Ask: Is Your SOC AI Ready? Not Simple to Answer!
Gemini made blog illustration In early 1900s, factory owners bolted the new electric dynamo onto their old, central-shaft-and-pulley systems. They thought they were modernizing, but they were just doing a “retrofit.” The massive productivity boom didn’t arrive until they completely re-architected the factory around the new unit-drive motor (metaphor source). Today’s AI agent slapped onto…
-
SIEM, Startups, and the Myth (Reality?) of IT Inertia: A Reformed Analyst Reflects on SIEM MQ 2025
Vaguely magical and quadranty thing (Gemini) It’s not every day you get to reflect on a journey that started as an odd “googley” startup and culminates in a shiny Leaders placement on a Gartner Magic Quadrant for SIEM 2025 (MQ). When I joined Chronicle in the summer of 2019″Š”, “Ša name now rolled into the broader Google…
-
Agentic AI in IT security: Where expectations meet reality
Tags: ai, api, automation, cloud, compliance, control, credentials, crowdstrike, cybersecurity, data, detection, finance, framework, gartner, google, governance, infrastructure, injection, metric, phishing, RedTeam, risk, service, siem, skills, soar, soc, software, strategy, technology, threat, tool, trainingIntegration approaches: Add-on vs. standalone: The first decision regarding AI agents is whether to layer them onto existing platforms or to implement standalone frameworks. The add-on model treats agents as extensions to security information and event management (SIEM), security orchestration, automation and response (SOAR), or other security tools, providing quick wins with minimal disruption. Standalone…
-
Agentic AI in IT security: Where expectations meet reality
Tags: ai, api, automation, cloud, compliance, control, credentials, crowdstrike, cybersecurity, data, detection, finance, framework, gartner, google, governance, infrastructure, injection, metric, phishing, RedTeam, risk, service, siem, skills, soar, soc, software, strategy, technology, threat, tool, trainingIntegration approaches: Add-on vs. standalone: The first decision regarding AI agents is whether to layer them onto existing platforms or to implement standalone frameworks. The add-on model treats agents as extensions to security information and event management (SIEM), security orchestration, automation and response (SOAR), or other security tools, providing quick wins with minimal disruption. Standalone…
-
Identity Resilience: Rubrik erweitert Integration mit CrowdStrike Falcon
Durch die Integration von Rubrik Security Cloud in Falcon Fusion SOAR, Next-Gen SIEM, Falcon Threat Intelligence und Charlotte AI können Sicherheitsteams den Prozess der Untersuchung und Reaktion vereinfachen First seen on infopoint-security.de Jump to article: www.infopoint-security.de/identity-resilience-rubrik-erweitert-integration-mit-crowdstrike-falcon/a42157/
-
Identity Resilience: Rubrik erweitert Integration mit CrowdStrike Falcon
Durch die Integration von Rubrik Security Cloud in Falcon Fusion SOAR, Next-Gen SIEM, Falcon Threat Intelligence und Charlotte AI können Sicherheitsteams den Prozess der Untersuchung und Reaktion vereinfachen First seen on infopoint-security.de Jump to article: www.infopoint-security.de/identity-resilience-rubrik-erweitert-integration-mit-crowdstrike-falcon/a42157/
-
Top 10 Best Security Orchestration, Automation, And Response (SOAR) Tools in 2025
Security Orchestration, Automation, and Response (SOAR) tools are revolutionizing how organizations defend against evolving threats, streamline security workflows, and automate incident response. In an era of complex attack surfaces and alert fatigue, SOAR solutions empower security teams to respond faster, reduce manual workloads, and maintain compliance across hybrid environments. This comprehensive guide reviews the top…
-
Where CISOs need to see Splunk go next
Tags: ai, api, automation, cisco, ciso, cloud, communications, compliance, conference, crowdstrike, cybersecurity, data, data-breach, detection, finance, framework, google, incident response, intelligence, jobs, metric, microsoft, open-source, RedTeam, resilience, risk, router, siem, soar, strategy, tactics, threat, tool, vulnerabilityResilience resides at the confluence of security and observability: There was also a clear message around resilience, the ability to maintain availability and recover quickly from any IT or security event.From a Cisco/Splunk perspective, this means a more tightly coupled relationship between security and observability.I’m reminded of a chat I had with the chief risk…
-
The Gravity of Process: Why New Tech Never Fixes Broken Process and Can AI Change It?
Tags: advisory, ai, api, best-practice, business, cybersecurity, data, flaw, grc, incident response, risk, siem, soar, soc, technology, threat, tool, trainingLet’s tackle the age old question: can new technology fix broken or missing processes? And then let’s add: does AI and AI agents change the answer you would give? Gemini illustration based on this blog This is the question which I recently debated with some friends, with a few AIs and with myself. The context was of…
-
Soar is your Safest Bet
It’s the middle of the week, you are working on a project that needs to be done, and while you are trying to focus, you get the same phishing alert for the 10th time this week. Your team is drowning in noise, and you’re looking around thinking, ‘It’s 2025. There has to be an […]…
-
Beyond Chatbots: Why Morpheus Leaves SOAR with Bolted-On AI in the Dust
Bolting a chatbot onto a legacy SOAR tool doesn’t make it intelligent. Here’s what real autonomous security operations look like, and why they matter. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/beyond-chatbots-why-morpheus-leaves-soar-with-bolted-on-ai-in-the-dust/

