Tag: soc
-
Webinar: Aligning cybersecurity purchases with what your SOC team needs
Learn how security leaders and SOC teams can work together to close the gap between platform decisions and operational needs. Join Sumo Logic and BleepingComputer on January 29 for a practical webinar on aligning security tools with real-world workflows. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/webinar-aligning-cybersecurity-purchases-with-what-your-soc-team-needs/
-
Webinar: Why execs don’t buy SOC teams the tools they need
Many security teams are forced to defend environments using tools they didn’t choose. This webinar explores how SOC teams can overcome alert fatigue, platform gaps, and AI hype to get real results from the tools they already have. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/webinar-why-execs-dont-buy-soc-teams-the-tools-they-need/
-
Thales named Growth Index leader in Frost Radar: Data Security Platforms Report
Tags: access, ai, business, cloud, compliance, container, control, data, defense, detection, edr, encryption, endpoint, governance, identity, intelligence, LLM, monitoring, risk, saas, service, siem, soc, technology, toolThales named Growth Index leader in Frost Radar: Data Security Platforms Report madhav Tue, 01/20/2026 – 04:29 Data has always been the backbone of enterprise operations, but the rise of cloud, big data, and GenAI has multiplied its value and, with it, the motivation for attackers. In parallel, regulatory expectations are increasing and evolving. The…
-
NDSS 2025 ASGARD
Session 9B: DNN Attack Surfaces Authors, Creators & Presenters: Myungsuk Moon (Yonsei University), Minhee Kim (Yonsei University), Joonkyo Jung (Yonsei University), Dokyung Song (Yonsei University) PAPER ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environments On-device deep learning, increasingly popular for enhancing user privacy, now poses a serious risk to the privacy of…
-
How does Agentic AI deliver value in SOC operations
Are Organizations Maximizing the Value of Agentic AI in SOC Operations? Where security threats evolve with alarming speed, security operations centers (SOCs) must remain at the forefront of innovation. One intriguing advancement capturing the attention of cybersecurity professionals is Agentic AI. Agentic AI offers a transformative approach to monitoring and managing non-human identities (NHIs), crucial……
-
Torq Gets $140M Series D to Fuel AI-Powered SOC Capabilities
Funding at $1.2B Valuation to Propel Federal Market Entry and R&D in GenAI. Torq secured $140 million in Series D funding at a $1.2 billion valuation to expand its generative AI-powered security operations platform. With backing from Merlin Ventures, Torq will grow internationally, deepen AI research and pursue U.S. federal opportunities including FedRAMP certification. First…
-
4 Outdated Habits Destroying Your SOC’s MTTR in 2026
It’s 2026, yet many SOCs are still operating the way they did years ago, using tools and processes designed for a very different threat landscape. Given the growth in volumes and complexity of cyber threats, outdated practices no longer fully support analysts’ needs, staggering investigations and incident response.Below are four limiting habits that may be…
-
Iran’s partial internet shutdown may be a windfall for cybersecurity intel
only available launchpads. A connection from the Ministry of Agriculture might not be a farmer. It’s likely a tunnel for a state actor who needs an exit node.”Ranjbar said the removal of the traffic from millions of routine Iranian business and residential users allows a powerful visibility into Iranian government traffic patterns, thereby allowing SOCs…
-
Agentic SOC Startup Torq Lands $1.2B Valuation, $140M Funding Round
Torq, a hyperautomation startup that has invested heavily into partner enablement over the past year, announced it has extended its valuation to $1.2 billion in connection with a new funding round of $140 million. First seen on crn.com Jump to article: www.crn.com/news/security/2026/agentic-soc-startup-torq-lands-1-2b-valuation-140m-funding-round
-
Angreifer missbrauchen Fernwartungstools: BlueVoyant deckt RMM-Kampagne auf
Die klare Empfehlung an Unternehmen und Security-Anbieter lautet daher: SOC-Erkennungsmechanismen regelmäßig überprüfen und anpassen. Die Kampagne macht deutlich, dass RMM-basierte Angriffe qualitativ deutlich an Raffinesse gewonnen haben. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/angreifer-missbrauchen-fernwartungstools-bluevoyant-deckt-rmm-kampagne-auf/a43328/
-
Beyond “Is Your SOC AI Ready?” Plan the Journey!
You read the “AI-ready SOC pillars” blog, but you still see a lot of this: Bungled AI SOC transition How do we do better? Let’s go through all 5 pillars aka readiness dimensions and see what we can actually do to make your SOC AI-ready. #1 SOC Data Foundations As I said before, this one is my…
-
Detect and Respond Faster with Elastic & Tines
Security operations center (SOC) teams are under nonstop pressure. Threats are rising, attack techniques are evolving, and analysts are drowning in alerts. Meanwhile, SOC leaders are asked to do more with fewer resources and tighter budgets. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/blogs/detect-respond-faster-elastic-tines-p-4022
-
AI SOC Anxiety: Does More Control Equal More Complexity?
SOC teams want AI they can control without recreating SOAR sprawl. This post explores why control and complexity feel linked, and how autonomy with guardrails breaks the tradeoff. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/ai-soc-anxiety-does-more-control-equal-more-complexity/
-
Startup Trends Shaking Up Browsers, SOC Automation, AppSec
In 2025, these startups have reimagined browser security, pioneered application security for AI-generated code, and are building consensus on agentic vs. human costs. First seen on darkreading.com Jump to article: www.darkreading.com/endpoint-security/startup-trends-shaking-up-browsers-soc-automation-appsec
-
Cyberabwehr im Kosten-Nutzen-Vergleich – Selbermachen oder Outtasken? Der Mehrwert eines Managed SOC
Tags: socFirst seen on security-insider.de Jump to article: www.security-insider.de/selbermachen-oder-outtasken-der-mehrwert-eines-managed-soc-a-0d534d56bac742a2afa7e93537d40ed3/
-
KI im SOC braucht Governance und klare Verantwortlichkeiten – Ohne Governance wird agentenbasierte KI im SOC zum Sicherheitsrisiko
First seen on security-insider.de Jump to article: www.security-insider.de/ki-agenten-soc-governance-a-a3f3d2a5ddad1c320cc2f3d6ad43fc2c/
-
Wie KI die Cybersicherheit neu gestaltet
Tags: ai, ciso, cloud, cyber, cyberattack, cybersecurity, cyersecurity, data, encryption, gartner, governance, group, guide, hacker, incident response, infrastructure, microsoft, phishing, resilience, risk, sans, soc, supply-chain, threat, tool, vulnerability-managementKünstliche Intelligenz und insbesondere Generative KI dringt immer tiefer in die Sicherheitsprozesse vor.Generative KI (GenAI) ist zu einem allgegenwärtigen Werkzeug in Unternehmen geworden. Laut einer Umfrage der Boston Consulting Group nutzen 50 Prozent der Unternehmen die Technologie, um Arbeitsabläufe neu zu gestalten. 77 Prozent der Befragten sind überzeugt, dass KI-Agenten in den nächsten drei bis…
-
How are SOC teams empowered by advanced Machine Identity Management
How Can Machine Identity Management Optimize Security Operations? In cybersecurity, how can organizations effectively minimize risks associated with unmanaged Non-Human Identities (NHIs)? Where businesses continue to depend heavily on cloud infrastructures and automated processes, understanding the strategic significance of NHIs becomes paramount, particularly for Security Operations Centers (SOC) teams tasked with safeguarding digital. With NHIs……
-
Identity Security 2026: Four Predictions & Recommendations
Agentic AI adoption and identity security risks, IGA expands in mid-market, SOC-identity team collaboration, and identity platform consolidation”, this 2026 predictions post previews identity trends. First seen on darkreading.com Jump to article: www.darkreading.com/identity-access-management-security/identity-security-2026-predictions-and-recommendations
-
Identity Security 2026: Four Predictions and Recommendations
Agentic AI adoption and identity security risks, IGA expands in mid-market, SOC-identity team collaboration, and identity platform consolidation”, this 2026 predictions post previews identity trends. First seen on darkreading.com Jump to article: www.darkreading.com/identity-access-management-security/identity-security-2026-predictions-and-recommendations
-
Start in die Ära des Agentic SOC Vom Analysten zum Kommandanten
Mit drei Innovationen will CrowdStrike Sicherheitsoperationen neu definieren: Falcon Agentic SOAR, die erweiterte Agentic Security Workforce und Falcon for XIoT. Im Zentrum steht eine strategische Idee Sicherheit durch intelligente, autonome Agenten, die mit menschlichem Urteilsvermögen handeln und Cyberangriffe in Echtzeit stoppen. First seen on ap-verlag.de Jump to article: ap-verlag.de/start-in-die-aera-des-agentic-soc-vom-analysten-zum-kommandanten/101255/
-
Real-World Cyber Attack Detection: How Modern SOCs Identify, Block, and Contain Advanced Threats
Executive Summary Modern cyberattacks rarely appear as a single, obvious incident. Instead, they manifest as multiple low-level signals across web, endpoint, DNS, cloud, and network telemetry. When analyzed in isolation, these signals may seem benign. When correlated intelligently, they reveal active attack campaigns targeting applications, identities, cloud storage, and network boundaries. This article presents a…
-
Implementing NIS2, without getting bogged down in red tape
Tags: access, ai, automation, backup, bsi, business, cloud, compliance, control, data, detection, email, encryption, iam, identity, incident response, infrastructure, law, least-privilege, metric, monitoring, network, nis-2, regulation, saas, sbom, service, siem, soc, software, startup, supply-chain, technology, threat, tool, update, vulnerability, vulnerability-management, zero-dayIT in transition: From text documents to declarative technology: NIS2 essentially requires three things: concrete security measures; processes and guidelines for managing these measures; and robust evidence that they work in practice.Process documentation, that is, policies, responsibilities, and procedures, is not fundamentally new for most larger companies. ISO 27001-based information security management systems, HR processes, and…
-
Der Aufstieg des Chief Trust Officers: Wo passt der CISO hinein?
Tags: ai, ceo, cio, ciso, compliance, cyersecurity, finance, governance, grc, office, risk, risk-management, soc, software, vulnerabilityDer Chief Trust Officer steht für einen Wandel von der Verteidigung von Systemen hin zur Sicherung der Glaubwürdigkeit.Immer mehr Unternehmen heben Vertrauen als Unterscheidungsmerkmal für ihr Geschäft hervor. Durch Datenschutzverletzungen, Bedenken hinsichtlich der Produktsicherheit und Unsicherheiten in Bezug auf künstliche Intelligenz hat das Vertrauen der Kunden in den vergangenen Jahren stark gelitten.Wie aus dem Edelman…
-
2025 Year in Review at Cloud Security Podcast by Google
Tags: 2fa, ai, automation, breach, cloud, compliance, computing, control, cybersecurity, data, defense, detection, edr, finance, google, hacking, incident response, infrastructure, linux, mandiant, metric, mitigation, offense, phone, privacy, risk, security-incident, siem, soc, technology, threat, vulnerability, vulnerability-management, zero-trust(written jointly with Tim Peacock) Five years. It’s enough time to fully launch a cloud migration, deploy a new SIEM, or”Š”, “Šif you’re a very large enterprise”Š”, “Šjust start thinking about doing the first two. It’s also how long Tim and I have been subjecting the world to our thoughts on Cloud Security Podcast by Google. We…
-
AI security is fundamentally a cloud infrastructure problem, Palo Alto Networks says
Companies should prioritize identity security and integrate cloud monitoring into the SOC, according to the security firm. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/ai-security-cloud-infrastructure-palo-alto-networks/808510/
-
Arctic Wolf CEO On How AI Will ‘Revolutionize’ The SOC, MSP Opportunities In 2026
In an interview with CRN, Arctic Wolf CEO Nick Schneider said that the cybersecurity skills shortage will to a large degree be solvable as AI and agentic capabilities become more available in the Security Operations Center (SOC). First seen on crn.com Jump to article: www.crn.com/news/security/2025/arctic-wolf-ceo-on-how-ai-will-revolutionize-the-soc-msp-opportunities-in-2026

