Tag: soc
-
We Keep Hearing the Same Question: Morpheus (AI SOC) vs. Traditional SOAR
SOC teams keep asking how the AI SOC differs from traditional SOAR. Here’s what Morpheus does differently”, from integration maintenance to false negatives. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/we-keep-hearing-the-same-question-morpheus-ai-soc-vs-traditional-soar/
-
Torq Moves SOCs Beyond SOAR With AI-Powered Hyper Automation
Investors poured $140 million into Torq’s Series D Round, bringing the startup’s valuation to $1.2 billion, to bring AI-based hyper automation to SOCs. First seen on darkreading.com Jump to article: www.darkreading.com/remote-workforce/torq-moves-socs-soar-ai-powered-hyper-automation
-
Inside Real-World SOC Detections: A Practical View of Modern Attack Patterns
Executive Overview Modern cyberattacks rarely appear as a single loud event. Instead, they unfold as low-and-slow sequences across endpoints, networks, and identity platforms. Attackers blend into normal enterprise activity, using legitimate tools, valid credentials, and trusted services to evade traditional detection. This analysis presents real-world attack detections observed in enterprise environments, illustrating how correlated endpoint,…
-
10 Cool Agentic Security Startups In 2026
CRN’s list of the coolest agentic security startups to know in 2026 includes emerging vendors in agentic SOC, agent-powered security remediation and AI agent protection. First seen on crn.com Jump to article: www.crn.com/news/security/2026/10-cool-agentic-security-startups-in-2026
-
CrowdStrike CEO George Kurtz: 2026 Is ‘Breakout Year’ For Agentic SOC
The agentic-powered “revolution” that is transforming the Security Operations Center (SOC) is set to pick up speed this year, providing massive opportunities to AI-savvy solution and service providers, according to CrowdStrike co-founder and CEO George Kurtz. First seen on crn.com Jump to article: www.crn.com/news/security/2026/crowdstrike-ceo-george-kurtz-2026-is-breakout-year-for-agentic-soc
-
Stop Staring at JSON: How GenAI is Solving the API >>Context Crisis<<
Tags: ai, api, attack, authentication, banking, business, credentials, credit-card, data, endpoint, governance, mobile, organized, risk, soc, threat, toolThere is a moment that happens in every SOC (Security Operations Center) every day. An alert fires. An analyst looks at a dashboard and sees a UR: POST /vs/payments/proc/77a. And then they stop. They stare. And they ask the question that kills productivity: “What does this thing actually do?” Is it a critical payment gateway?…
-
Smarter Security, Smaller Teams: Building Resilience with Limited Resources
Security teams are being asked to manage enterprise-scale threats with fewer tools, fewer analysts, and tighter budgets. Discover how high-performing SOCs are building clarity-driven, resilience-focused programs that scale without alert overload, burnout, or runaway complexity. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/security/smarter-security-smaller-teams-building-resilience-with-limited-resources/
-
From Triage to Threat Hunts: How AI Accelerates SecOps
If you work in security operations, the concept of the AI SOC agent is likely familiar. Early narratives promised total autonomy. Vendors seized on the idea of the “Autonomous SOC” and suggested a future where algorithms replaced analysts.That future has not arrived. We have not seen mass layoffs or empty security operations centers. We have…
-
10 Hot Agentic SOC Tools In 2026
Among the hottest agentic SOC tools in 2026 include AI-powered security operations tools from CrowdStrike, Microsoft, Palo Alto Networks, SentinelOne and Zscaler. First seen on crn.com Jump to article: www.crn.com/news/security/2026/10-hot-agentic-soc-tools-in-2026
-
Clawdbot-Style Agentic Assistants: What Your SOC Should Monitor, Triage, and Contain
What SOC teams need to monitor, triage, and contain when clawdbot-like agentic AI assistants. Includes detection signals, triage questions, and a containment playbook. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/clawdbot-style-agentic-assistants-what-your-soc-should-monitor-triage-and-contain/
-
CISO’s predictions for 2026
Tags: access, ai, attack, authentication, automation, breach, business, ciso, cloud, control, credentials, cryptography, cyber, cyberattack, cybersecurity, data, data-breach, encryption, endpoint, extortion, finance, governance, government, healthcare, identity, infrastructure, malicious, mobile, mssp, network, password, penetration-testing, ransomware, risk, router, saas, soc, strategy, supply-chain, technology, threat, tool, vulnerability, warfareAI agents to reshape the threat landscape: But those same AI technologies are also changing the threat landscape. Toal points to a recent Anthropic report that documented the first large-scale AI-enabled cyberattack as an early warning sign. “I guarantee attackers will be more focused on using AI agents for what they want than a lot…
-
NDSS 2025 RContainer
Session 10A: Confidential Computing 2 Authors, Creators & Presenters: Qihang Zhou (Institute of Information Engineering, Chinese Academy of Sciences), Wenzhuo Cao (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyberspace Security, University of Chinese Academy of Sciences), Xiaoqi Jia (Institute of Information Engineering, Chinese Academy of Sciences), Peng Liu (The Pennsylvania State University,…
-
Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time
Halo Security, a leading provider of external attack surface management and penetration testing services, today announced it has… First seen on hackread.com Jump to article: hackread.com/halo-security-achieves-soc-2-type-ii-compliance/
-
News Alert: Halo Security earns SOC 2 Type II certification, shows sustained operational security
MIAMI, Jan. 22, 2026, CyberNewswire, Halo Security, a leading provider of external attack surface management and penetration testing services, today announced it has successfully achieved SOC 2 Type II compliance following an extensive multi-month audit by Insight Assurance.”¦ (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/news-alert-halo-security-earns-soc-2-type-ii-certification-shows-sustained-operational-security/
-
Technische Härtung, Identity Controls und Detektion für SOC-Betrieb – Initiale Sicherheitskonfiguration von SAP S/4HANA
First seen on security-insider.de Jump to article: www.security-insider.de/sap-s4hana-initiale-sicherheitskonfiguration-a-5b0099d45e74f0640dccb4370b99f649/
-
Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time
Miami, Florida, January 22nd, 2026, CyberNewsWire Halo Security, a leading provider of external attack surface management and penetration testing services, today announced it has successfully achieved SOC 2 Type II compliance following an extensive multi-month audit by Insight Assurance. This certification validates that Halo Security’s security controls are not only properly designed but also operate…
-
Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time
Miami, Florida, 22nd January 2026, CyberNewsWire First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/halo-security-achieves-soc-2-type-ii-compliance-demonstrating-sustained-security-excellence-over-time/
-
Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time
Miami, Florida, 22nd January 2026, CyberNewsWire First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/halo-security-achieves-soc-2-type-ii-compliance-demonstrating-sustained-security-excellence-over-time/
-
JA3 Fingerprinting Tool Exposes Attackers’ Infrastructure
JA3 fingerprinting, long dismissed as outdated technology, is experiencing a resurgence as security teams discover its practical value in identifying and tracking malicious infrastructure with surprising precision. Despite widespread skepticism about JA3’s relevance fueled by frozen public databases and inconsistent threat intelligence updates the indicator remains a powerful asset for SOC and threat hunting teams.…
-
Webinar: Aligning cybersecurity purchases with what your SOC team needs
Learn how security leaders and SOC teams can work together to close the gap between platform decisions and operational needs. Join Sumo Logic and BleepingComputer on January 29 for a practical webinar on aligning security tools with real-world workflows. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/webinar-aligning-cybersecurity-purchases-with-what-your-soc-team-needs/
-
Webinar: Why execs don’t buy SOC teams the tools they need
Many security teams are forced to defend environments using tools they didn’t choose. This webinar explores how SOC teams can overcome alert fatigue, platform gaps, and AI hype to get real results from the tools they already have. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/webinar-why-execs-dont-buy-soc-teams-the-tools-they-need/
-
Thales named Growth Index leader in Frost Radar: Data Security Platforms Report
Tags: access, ai, business, cloud, compliance, container, control, data, defense, detection, edr, encryption, endpoint, governance, identity, intelligence, LLM, monitoring, risk, saas, service, siem, soc, technology, toolThales named Growth Index leader in Frost Radar: Data Security Platforms Report madhav Tue, 01/20/2026 – 04:29 Data has always been the backbone of enterprise operations, but the rise of cloud, big data, and GenAI has multiplied its value and, with it, the motivation for attackers. In parallel, regulatory expectations are increasing and evolving. The…
-
NDSS 2025 ASGARD
Session 9B: DNN Attack Surfaces Authors, Creators & Presenters: Myungsuk Moon (Yonsei University), Minhee Kim (Yonsei University), Joonkyo Jung (Yonsei University), Dokyung Song (Yonsei University) PAPER ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environments On-device deep learning, increasingly popular for enhancing user privacy, now poses a serious risk to the privacy of…
-
How does Agentic AI deliver value in SOC operations
Are Organizations Maximizing the Value of Agentic AI in SOC Operations? Where security threats evolve with alarming speed, security operations centers (SOCs) must remain at the forefront of innovation. One intriguing advancement capturing the attention of cybersecurity professionals is Agentic AI. Agentic AI offers a transformative approach to monitoring and managing non-human identities (NHIs), crucial……
-
Torq Gets $140M Series D to Fuel AI-Powered SOC Capabilities
Funding at $1.2B Valuation to Propel Federal Market Entry and R&D in GenAI. Torq secured $140 million in Series D funding at a $1.2 billion valuation to expand its generative AI-powered security operations platform. With backing from Merlin Ventures, Torq will grow internationally, deepen AI research and pursue U.S. federal opportunities including FedRAMP certification. First…
-
4 Outdated Habits Destroying Your SOC’s MTTR in 2026
It’s 2026, yet many SOCs are still operating the way they did years ago, using tools and processes designed for a very different threat landscape. Given the growth in volumes and complexity of cyber threats, outdated practices no longer fully support analysts’ needs, staggering investigations and incident response.Below are four limiting habits that may be…
-
Iran’s partial internet shutdown may be a windfall for cybersecurity intel
only available launchpads. A connection from the Ministry of Agriculture might not be a farmer. It’s likely a tunnel for a state actor who needs an exit node.”Ranjbar said the removal of the traffic from millions of routine Iranian business and residential users allows a powerful visibility into Iranian government traffic patterns, thereby allowing SOCs…
-
Agentic SOC Startup Torq Lands $1.2B Valuation, $140M Funding Round
Torq, a hyperautomation startup that has invested heavily into partner enablement over the past year, announced it has extended its valuation to $1.2 billion in connection with a new funding round of $140 million. First seen on crn.com Jump to article: www.crn.com/news/security/2026/agentic-soc-startup-torq-lands-1-2b-valuation-140m-funding-round
-
Angreifer missbrauchen Fernwartungstools: BlueVoyant deckt RMM-Kampagne auf
Die klare Empfehlung an Unternehmen und Security-Anbieter lautet daher: SOC-Erkennungsmechanismen regelmäßig überprüfen und anpassen. Die Kampagne macht deutlich, dass RMM-basierte Angriffe qualitativ deutlich an Raffinesse gewonnen haben. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/angreifer-missbrauchen-fernwartungstools-bluevoyant-deckt-rmm-kampagne-auf/a43328/

