Tag: soc
-
Deepwatch Appoints Brian Dhatt as Chief Executive Officer to Lead its Next Phase as a Scaled Autonomous SOC Platform
Company promotes cybersecurity veteran Anand Ramanathan to President; John DiLullo to remain as advisor PALO ALTO, Calif., May 4, 2026 “, Deepwatch, the leading autonomous SOC platform built on more than a decade of real-world security operations data, today announced the appointment of Brian Dhatt as Chief Executive Officer. Dhatt succeeds John DiLullo, who will”¦ Continue…
-
How 7AI Is Rebuilding The SOC Around Agentic AI: CEO Lior Div
7AI is aiming to build on the massive momentum with partners and customers for its AI-powered security investigations to offer a complete agentic AI platform for the Security Operations Center (SOC), according to 7AI co-founder and CEO Lior Div. First seen on crn.com Jump to article: www.crn.com/news/security/2026/how-7ai-is-rebuilding-the-soc-around-agentic-ai-ceo-lior-div
-
The metrics killing your SOC, and what to use instead
Security operations centres risk being rendered entirely ineffective if organizations measure them using the wrong performance indicators, according to Dave Chismon, CTO for … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/28/soc-performance-metrics/
-
Breaking the Endpoint Tax: Aligning Security With Risk
How Risk-Centric Architecture, Unified Pricing Give SOC Managers Total Visibility Security teams can’t afford to leave assets unprotected, but per-endpoint pricing forces exactly that trade-off. Learn how abandoning rigid license models and adopting risk-centric architecture gives SOC teams total visibility and kernel-level prevention across every environment. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/blogs/breaking-endpoint-tax-aligning-security-risk-p-4108
-
No Metrics Are Better Than Bad Metrics in the SOC, Says NCSC
The National Cyber Security Centre has warned against measuring SOCs with ticket-based metrics First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/no-metrics-better-bad-metrics-soc/
-
No Metrics Are Better Than Bad Metrics in the SOC, Says NCSC
The National Cyber Security Centre has warned against measuring SOCs with ticket-based metrics First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/no-metrics-better-bad-metrics-soc/
-
12 Signs Your SaaS Product Isn’t Enterprise-Ready (and How to Fix Each)
Not sure if your SaaS is enterprise-ready? Score yourself on 12 signs procurement teams check, SSO, SCIM, SOC 2, audit logs, and more. Includes a team scorecard. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/12-signs-your-saas-product-isnt-enterprise-ready-and-how-to-fix-each/
-
Neue Managed Services stellen die Weichen für digitale Souveränität
Controlware betreibt Cloud-basiertes Security Operations Center auf Basis von Sekoia.io Controlware erweitert das Managed Service-Portfolio um neue, digital souveräne SOC-Services auf Basis der europäischen Threat-Detection-&-Response-Plattform Sekoia.io. Das Angebot richtet sich an mittelständische und große Unternehmen sowie öffentliche Einrichtungen, die ihre Cyberabwehr stärken und gleichzeitig wachsenden Anforderungen an Datenhoheit, regulatorische Sicherheit und technologische Unabhängigkeit gerecht… First…
-
12 Signs Your SaaS Product Isn’t Enterprise-Ready (and How to Fix Each)
Not sure if your SaaS is enterprise-ready? Score yourself on 12 signs procurement teams check, SSO, SCIM, SOC 2, audit logs, and more. Includes a team scorecard. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/12-signs-your-saas-product-isnt-enterprise-ready-and-how-to-fix-each/
-
12 Signs Your SaaS Product Isn’t Enterprise-Ready (and How to Fix Each)
Not sure if your SaaS is enterprise-ready? Score yourself on 12 signs procurement teams check, SSO, SCIM, SOC 2, audit logs, and more. Includes a team scorecard. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/12-signs-your-saas-product-isnt-enterprise-ready-and-how-to-fix-each/
-
The ‘manager of agents’: How AI evolves the SOC analyst role
Tags: ai, automation, business, control, credentials, cybersecurity, data, detection, intelligence, jobs, risk, skills, soc, technology, threat, toolFrom doing the work to directing it: What agentic AI introduces into the SOC is the ability to delegate.Instead of analysts manually gathering evidence and stitching together context, AI agents can now autonomously execute investigative steps: Querying systems, correlating signals and building evidence chains in real time. It doesn’t remove the human from the process.…
-
Erweitertes Security-Portfolio – Acronis bietet MDR-Services für MSP ohne eigenes SOC
First seen on security-insider.de Jump to article: www.security-insider.de/acronis-bietet-mdr-services-fuer-msp-ohne-eigenes-soc-a-f4d95317002567025fbf82acef79ded4/
-
When Mythos Finds Thousands of Zero-Days, EU Regulators Won’t Wait for Your SOC to Catch Up
Can your SOC triage thousands of Mythos findings in 24 hours? NIS2, CRA, and DORA are all waiting. Miss one clock and the penalties begin. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/when-mythos-finds-thousands-of-zero-days-eu-regulators-wont-wait-for-your-soc-to-catch-up/
-
AI-Powered Agentic Browser Defense Blog – Menlo Security
Stop zero-hour threats with the Menlo HEAT Shield Agent. A browser-native AI solution using Gemini to block malicious sites and automate SOC policy in real-time First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/ai-powered-agentic-browser-defense-blog-menlo-security/
-
5 Places where Mature SOCs Keep MTTR Fast and Others Waste Time
Security teams often present MTTR as an internal KPI. Leadership sees it differently: every hour a threat dwells inside the environment is an hour of potential data exfiltration, service disruption, regulatory exposure, and brand damage. The root cause of slow MTTR is almost never “not enough analysts.” It is almost always the same structural problem:…
-
Attackers abuse Microsoft Teams to impersonate the IT helpdesk in a new enterprise intrusion playbook
Cross-tenant risk grows: The attack chain uses Teams’ cross-tenant communication capability, which allows external users to initiate chats with employees, Microsoft wrote in the blog.”The cross-tenant risk is significant, and many organizations probably do underestimate it,” said Sunil Varkey, advisor at Beagle Security.”Collaboration tools were designed to reduce friction, but many organizations enabled that convenience…
-
Belgium’s NIS2 Audit Window Opens April 18, 2026. The Rest of the EU Is Right Behind.
Belgium’s NIS2 conformity assessment deadline hits April 18, 2026, and other EU member states are ramping enforcement close behind. See what auditors will demand from your SOC: incident reporting timelines, Article 20 management liability, and automatic documentation. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/belgiums-nis2-audit-window-opens-april-18-2026-the-rest-of-the-eu-is-right-behind/
-
Beyond the Spreadsheet: Why Manual AI Audits Are an EU AI Act Compliance Liability FireTail Blog
Tags: access, ai, ciso, cloud, compliance, control, data, detection, finance, framework, GDPR, governance, grc, group, incident response, infrastructure, ISO-27001, monitoring, regulation, risk, saas, service, soc, toolApr 16, 2026 – Alan Fagan – When it comes to the EU AI Act, many organisations take a manual approach to auditing, which looks impressive on paper but collapses under regulatory scrutiny. They use policies, surveys, working groups, and a well-formatted risk register. However, a manual approach does not provide the continuous, automated, technical…
-
Beyond the Spreadsheet: Why Manual AI Audits Are an EU AI Act Compliance Liability FireTail Blog
Tags: access, ai, ciso, cloud, compliance, control, data, detection, finance, framework, GDPR, governance, grc, group, incident response, infrastructure, ISO-27001, monitoring, regulation, risk, saas, service, soc, toolApr 16, 2026 – Alan Fagan – When it comes to the EU AI Act, many organisations take a manual approach to auditing, which looks impressive on paper but collapses under regulatory scrutiny. They use policies, surveys, working groups, and a well-formatted risk register. However, a manual approach does not provide the continuous, automated, technical…
-
Mallory Launches AI-Native Threat Intelligence Platform, Turning Global Threat Data Into Prioritized Action
What are the real threat vectors for our organization?What’s actually exploitable in our environment right now?What should we proactively fix?The platform monitors thousands of threat sources, contextualizes them against a user’s actual attack surface, and puts that intelligence to work across hunt, detection, and exposure management use cases. One platform. Answers, not alerts.Modern teams receive…
-
Most “AI SOCs” Are Just Faster Triage. That’s Not Enough.
AI-powered SOC tools promise automation, but most only speed up triage instead of reducing real workload. Tines shows how real gains come from end-to-end workflows that execute actions across systems, not just summarize alerts. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/most-ai-socs-are-just-faster-triage-thats-not-enough/
-
Claude Mythos: Prepare for your board’s cybersecurity questions about the latest AI model from Anthropic
Tags: ai, api, application-security, attack, authentication, automation, best-practice, business, ceo, cisa, cloud, compliance, container, control, cve, cvss, cyber, cybersecurity, data, data-breach, endpoint, exploit, fedramp, finance, flaw, framework, governance, group, HIPAA, identity, injection, insurance, kev, law, linkedin, linux, LLM, macOS, network, PCI, risk, service, soc, software, strategy, technology, threat, update, vulnerability, vulnerability-management, windows, zero-day, zero-trustWith the Federal Reserve Chairman meeting with bank CEOs to discuss the security implications of Claude Mythos, you can bet that your board of directors will ask you about the impact of the AI model on your cybersecurity strategy. Here’s how to prepare. Key takeaways Anthropic announced Claude Mythos Preview, its most powerful general-purpose frontier…
-
4 questions to ask before outsourcing MDR
2. Can your team separate real threats from noise?: Alert fatigue is one of the biggest barriers to effective security. Tools generate volumes of signals, but not all alerts represent real risk. When everything looks critical, teams either burn out or miss the alerts that matter most.MDR helps by applying human expertise and threat intelligence…
-
The AI inflection point: What security leaders must do now
The questions have matured: The AI discussion in security has evolved in phases.First came skepticism from security leaders, asking whether AI actually works in security operations. Given years of overpromised technology, the caution was warranted.Experimentation followed, with questions centering on what types of work AI should handle and where it introduces risk.Now, the dominant questions…
-
How AI is transforming threat detection
Tags: ai, attack, automation, best-practice, business, ceo, cisa, cve, cyber, data, detection, email, endpoint, framework, google, governance, group, incident response, intelligence, international, jobs, kev, malware, network, nist, organized, phishing, risk, skills, soc, switch, technology, threat, toolReducing alert fatigue: In alert triage, AI agents are reducing alert fatigue by clustering alert patterns and enabling risk-based prioritization, adds Dipto Chakravarty, chief product and technology officer at Black Duck.For example, natural language processing agents can summarize threat alerts at scale and correlate them with threat intel feeds such as CVE.org and the CISA KEV Catalog,…
-
The AI inflection point: What security leaders must do now
The questions have matured: The AI discussion in security has evolved in phases.First came skepticism from security leaders, asking whether AI actually works in security operations. Given years of overpromised technology, the caution was warranted.Experimentation followed, with questions centering on what types of work AI should handle and where it introduces risk.Now, the dominant questions…
-
What role does Agentic AI play in enhancing SOC operations?
How Significant is Non-Human Identity Management in SOC Operations? Have you ever wondered how the management of non-human identities (NHIs) impacts the efficacy of Security Operations Centers (SOC)? With cybersecurity professionals strive to maintain a robust defense, effectively managing NHIs becomes a central concern. Let’s explore how this concept can revolutionize SOC operations by ensuring……
-
TDL 019 – The Psychology Behind a Cyber Breach and the Leaders Who Survive It – Nim Nadarajah
Tags: access, ai, apple, automation, breach, business, cctv, ceo, cio, ciso, cloud, computing, conference, control, corporate, crowdstrike, cve, cyber, cyberattack, cybersecurity, data, dns, edr, email, finance, firewall, governance, group, healthcare, incident, incident response, infrastructure, injection, insurance, Internet, jobs, law, LLM, metric, microsoft, msp, network, office, powershell, privacy, programming, psychology, risk, saas, service, siem, soar, soc, software, startup, strategy, supply-chain, switch, technology, threat, tool, training, usa, vulnerability, windows, zero-trustLeading Through the Cyber Abyss In Episode 019 of The Defender’s Log, host David Redekop sits down with Nim Nadarajah, CISO and Managing Partner of Critical Matrix, to explore the evolving landscape of cybersecurity leadership. From the “annual pilgrimage” of RSAC 2026 to the front lines of incident response, the conversation shifts from technical bits…
-
TDL 019 – The Psychology Behind a Cyber Breach and the Leaders Who Survive It – Nim Nadarajah
Tags: access, ai, apple, automation, breach, business, cctv, ceo, cio, ciso, cloud, computing, conference, control, corporate, crowdstrike, cve, cyber, cyberattack, cybersecurity, data, dns, edr, email, finance, firewall, governance, group, healthcare, incident, incident response, infrastructure, injection, insurance, Internet, jobs, law, LLM, metric, microsoft, msp, network, office, powershell, privacy, programming, psychology, risk, saas, service, siem, soar, soc, software, startup, strategy, supply-chain, switch, technology, threat, tool, training, usa, vulnerability, windows, zero-trustLeading Through the Cyber Abyss In Episode 019 of The Defender’s Log, host David Redekop sits down with Nim Nadarajah, CISO and Managing Partner of Critical Matrix, to explore the evolving landscape of cybersecurity leadership. From the “annual pilgrimage” of RSAC 2026 to the front lines of incident response, the conversation shifts from technical bits…

