Tag: soc
-
Is AI here to take or redefine your cybersecurity role?
Tags: ai, attack, automation, business, ceo, cloud, compliance, conference, control, crowdstrike, cyber, cybersecurity, data, governance, intelligence, jobs, monitoring, phishing, risk, skills, soc, software, strategy, technology, threat, training, vulnerability“AI is coming, and will take some jobs, but no need to worry.”That headline ran atop a CSO story published in 2016. Nine years later, the prediction feels closer to coming true, with questions around jobs being replaced or redefined and whether cybersecurity pros should be worried taking on greater nuance, and still hanging in…
-
5 Features Every AI-Powered SOC Platform Needs in 2025
A modern AI-based SOC platform must adapt in real time to handle alert overloads and fast-moving threats, surpassing traditional SIEM tools. Modern security operations centers (SOCs) are under immense pressure. Analysts are overwhelmed, alert queues are overflowing, and attackers are moving faster than ever. Where once it was enough to have good visibility and a…
-
8 trends transforming the MDR market today
Tags: access, ai, at&t, attack, automation, breach, cloud, compliance, control, cyber, cybersecurity, data, detection, edr, endpoint, framework, GDPR, google, identity, infrastructure, intelligence, iot, least-privilege, monitoring, mssp, network, nis-2, ransomware, risk, service, siem, soc, sophos, strategy, technology, threat, tool, zero-trustDigital transformation complexifies the attack surface: As businesses modernize their IT environments, the complexity of securing hybrid and cloud-native infrastructures increases, making MDR an attractive option for scalable, expert-led protection, experts say.The shift to hybrid work, IoT adoption, and an increase in cloud migrations have dramatically expanded attack surfaces, while ransomware and AI-powered attacks constantly…
-
Thermomix TM5 Vulnerabilities Enable Remote Takeover by Attackers
Researchers have uncovered multiple vulnerabilities in the Thermomix TM5, a multifunctional kitchen appliance from Vorwerk, allowing attackers to potentially achieve remote takeover through firmware manipulation and persistent code execution. The device’s main board, powered by a Freescale/NXP i.MX28 SoC with ARM926EJ-S core, integrates a NAND flash (Toshiba TC58NVG0S3HTA00) and DDR2 SDRAM, which were dumped and…
-
Train smarter, respond faster: Close the skill gaps in your SOC
>>In today’s fast-paced digital landscape
-
Train smarter, respond faster: Close the skill gaps in your SOC
>>In today’s fast-paced digital landscape
-
Hg Purchases A-Lign to Accelerate Cyber Compliance Growth
Cybersecurity Compliance Vendor A-Lign Plans Global Expansion With Backing From Hg. Cybersecurity compliance firm A-LIGN has received a majority investment from Hg, a top tech-focused private equity firm. The deal supports A-LIGN’s global ambitions to deliver SOC 2 and other compliance audits and leverages Hg’s expertise in scaling data and AI-driven services. First seen on…
-
Train smarter, respond faster: Close the skill gaps in your SOC
>>In today’s fast-paced digital landscape
-
Cybersecurity in the supply chain: strategies for managing fourth-party risks
Tags: access, breach, business, ciso, compliance, control, cyber, cybersecurity, data, exploit, framework, governance, intelligence, ISO-27001, law, mitigation, monitoring, nist, risk, risk-management, saas, service, soc, software, strategy, supply-chain, threat, tool, vulnerabilitySet clear data boundaries: The reality is that any organization consuming third-party software-as-a-service offerings and services has extremely limited control over the partners that their third parties are working with, says Curtis Simpson, CISO at Armis.”This is why it’s critically important to understand the sub-processors involved in the delivery of contracted SaaS offerings and services,…
-
The Hidden Weaknesses in AI SOC Tools that No One Talks About
If you’re evaluating AI-powered SOC platforms, you’ve likely seen bold claims: faster triage, smarter remediation, and less noise. But under the hood, not all AI is created equal. Many solutions rely on pre-trained AI models that are hardwired for a handful of specific use cases. While that might work for yesterday’s SOC, today’s reality is…
-
Ein widerstandsfähiges SOC aufbauen
Warum es so wichtig ist zu den Grundlagen zurückzukehren. Oft passiert das Folgende in Unternehmen: Es gibt einen neuen Bedrohungsbericht über einen möglichen Angreifer und das SOC (Security Operation Center) beginnt mit der Suche nach Taktiken, Techniken und Verfahren (TTPs) ohne etwas zu finden. Zwei Monate später erpresst derselbe Angreifer das Unternehmen mit gestohlenen Daten….…
-
That Network Traffic Looks Legit, But it Could be Hiding a Serious Threat
With nearly 80% of cyber threats now mimicking legitimate user behavior, how are top SOCs determining what’s legitimate traffic and what is potentially dangerous?Where do you turn when firewalls and endpoint detection and response (EDR) fall short at detecting the most important threats to your organization? Breaches at edge devices and VPN gateways have risen…
-
Ein widerstandsfähiges Security-Operations-Center aufbauen
Oft passiert das Folgende in Unternehmen: Es gibt einen neuen Bedrohungsbericht über einen möglichen Angreifer und das SOC (Security-Operations-Center) beginnt mit der Suche nach Taktiken, Techniken und Verfahren (TTPs) ohne etwas zu finden. Zwei Monate später erpresst derselbe Angreifer das Unternehmen mit gestohlenen Daten. An diesem Beispiel sieht man gut, wie das SOC aufgrund zu…
-
How SOCs Improve Key Cybersecurity KPIs with Better Threat Analysis
Disclosure: This article was provided by ANY.RUN. The information and analysis presented are based on their research and findings. First seen on hackread.com Jump to article: hackread.com/how-socs-improve-cybersecurity-kpis-threat-analysis/
-
Evaluating AI Solutions for the SOC: Why Centralized Autonomy Outperforms Agentic AI
Compare centralized autonomous SOC engines like Morpheus against agentic AI solutions. Learn why unified control beats agent swarms. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/06/evaluating-ai-solutions-for-the-soc-why-centralized-autonomy-outperforms-agentic-ai/
-
Escaping SOC Burnout: State of Security 2025
Michael Fanning, CISO at Splunk, shares insights on cybersecurity challenges highlighted in the Splunk State of Security report. Key issues include analyst burnout and alert fatigue, which persist over time. Fanning discusses how AI can improve efficiency and support analysts, emphasizing the need for better prioritization and event correlation in security operations to enhance effectiveness..…
-
How to Chart an Exposure Management Leadership Path for You, Your Boss and Your Organization
Tags: access, attack, automation, breach, business, ciso, cloud, container, cybersecurity, data, defense, exploit, identity, incident response, iot, jobs, kubernetes, ransom, regulation, risk, security-incident, service, soc, threat, tool, vulnerability, vulnerability-managementEach Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, we share some tips on how to lead the move to exposure management. You can read the entire Exposure Management Academy series here. For years, organizations poured resources into reactive…
-
How exposure-enriched SOC data can cut cyberattacks in half by 2028
Gartner projects that by 2028, organizations enriching their Security Operations Center (SOC) data with exposure insights will reduce the frequency and impact of cyberattacks … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/06/30/plextrac-data-exposure-management/
-
Why MSSPs Need a Human-Augmented Autonomous SOC
First seen on scworld.com Jump to article: www.scworld.com/native/why-mssps-need-a-human-augmented-autonomous-soc
-
Business Case for Agentic AI SOC Analysts
Security operations centers (SOCs) are under pressure from both sides: threats are growing more complex and frequent, while security budgets are no longer keeping pace. Today’s security leaders are expected to reduce risk and deliver results without relying on larger teams or increased spending.At the same time, SOC inefficiencies are draining resources. Studies show that…
-
6 key trends redefining the XDR market
Tags: access, ai, apache, attack, cloud, country, crowdstrike, cybersecurity, data, detection, edr, endpoint, framework, identity, incident response, infrastructure, intelligence, marketplace, microsoft, ml, monitoring, msp, mssp, network, office, open-source, ransomware, service, siem, soc, sophos, threat, toolXDR-as-a-service on the rise: A fully staffed SOC is out of reach for many organizations and that’s why the rise of XDR-as-a-service reflects growing demand for managed, scalable security capabilities.”With stretched teams and expanding attack surfaces, many organizations are turning to trusted providers to deliver round-the-clock detection and response,” says Santiago Pontiroli, lead security researcher…
-
Your L1/L2 Pipeline Is Leaking Profit. The Autonomous SOC Turns It Into a Growth Driver
Tags: socFirst seen on scworld.com Jump to article: www.scworld.com/native/your-l1-l2-pipeline-is-leaking-profit-the-autonomous-soc-turns-it-into-a-growth-driver
-
KnowBe4 und Microsoft bündeln Kräfte für mehr ESicherheit
Neben einer verbesserten Erkennung von Bedrohungen ermöglicht die Integration auch eine effizientere Arbeit der Security-Teams: Einheitliche SOC-Tools unterstützen bei Analyse, Ursachenforschung und Reaktion schnell, gezielt und effektiv. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/knowbe4-und-microsoft-buendeln-kraefte-fuer-mehr-e-mail-sicherheit/a41246/
-
Why the SOC needs its “Moneyball” moment
Tags: socIn the classic book and later Brad Pitt movie Moneyball, the Oakland A’s didn’t beat baseball’s giants by spending more they won by thinking differently, scouting … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/06/25/soc-ai-powered-graphs/
-
Keeper Security Achieves SOC 3 Compliance
Keeper Security has achieved System and Organisation Controls (SOC) 3® compliance, demonstrating the company’s commitment to the highest standards of security for all users. The SOC 3 report, governed by the American Institute of Certified Public Accountants (AICPA), is a public-facing certification that validates the security, availability and confidentiality of Keeper’s systems. As part of…
-
Huawei’s latest notebook shows China is still generations behind in chipmaking
Kirin X90 SoC made on two-year-old 7nm N+2 process First seen on theregister.com Jump to article: www.theregister.com/2025/06/23/huaweis_foldable_shows_china_years_behind_tsmc/
-
Intezer and Torq Enable First AgentAgent AI Collaboration for Smarter SOC Automation
First seen on scworld.com Jump to article: www.scworld.com/news/intezer-and-torq-enable-first-agent-to-agent-ai-collaboration-for-smarter-soc-automation
-
Anton’s Security Blog Quarterly Q2 2025
Tags: ai, automation, breach, ciso, cloud, cyber, defense, detection, google, governance, guide, metric, office, RedTeam, siem, soc, software, supply-chain, threat, vulnerability, vulnerability-management, zero-trustAmazingly, Medium has fixed the stats so my blog/podcast quarterly is back to life. As before, this covers both Anton on Security and my posts from Google Cloud blog, and our Cloud Security Podcast (subscribe). Top 10 posts with the most lifetime views (excluding paper announcement blogs): Anton’s Alert Fatigue: The Study [A.C.”Š”, “Šwow, this…
-
Simbian Advances the AI Frontier With Industry’s First Benchmark for Measuring LLM Performance in the SOC
Simbian’s approach offers a new blueprint for how to evaluate and evolve AI for real-world use, without losing sight of the human element. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/06/simbian-advances-the-ai-frontier-with-industrys-first-benchmark-for-measuring-llm-performance-in-the-soc/
-
How AI-Enabled Workflow Automation Can Help SOCs Reduce Burnout
It sure is a hard time to be a SOC analyst. Every day, they are expected to solve high-consequence problems with half the data and twice the pressure. Analysts are overwhelmed”, not just by threats, but by the systems and processes in place that are meant to help them respond. Tooling is fragmented. Workflows are…

