Tag: soc
-
How Red Canary Acquisition Will Fortify Zscaler’s MDR Muscle
Zscaler Aims for SOC Leadership With Enhanced Visibility Across Endpoints and Cloud. By acquiring Denver-based startup Red Canary, cloud security stalwart Zscaler adds deep MDR functionality and aims to unify detection workflows across its customer environments using insights from its massive transaction volume, identity analytics and Red Canary’s advanced threat-hunting service. First seen on govinfosecurity.com…
-
Building a Security Portfolio Even When You’re a Blue Teamer
Things to Include on Your CV When Your Job Focuses on Keeping Systems Running If you’re a junior SOC analyst, a GRC specialist, or someone working in ICS environments, the idea of a cyber portfolio might seem irrelevant. It’s not. Employers need tangible proof of your skills, and a well-constructed portfolio does just that –…
-
Zscaler Buys Red Canary to Elevate AI-Driven Threat Response
Red Canary Purchase Aims to Deliver Agentic AI-Powered Security Operations at Scale. Zscaler’s buy of Red Canary will unify its cloud-based security infrastructure with Red Canary’s MDR insights, giving rise to a next-gen SOC built on automation, AI, and rapid detection expertise. The integration will support a proactive SOC experience powered by AI workflows and…
-
DefectDojo Unifies SOC and AppSec Workflows with Next-Gen Pro Platform
First seen on scworld.com Jump to article: www.scworld.com/news/defectdojo-unifies-soc-and-appsec-workflows-with-next-gen-pro-platform
-
Feel Relieved by Perfecting Your NHI Tactics
Is Your Cybersecurity Strategy Ready for Non-Human Identities? Non-Human Identities (NHIs) and Secrets Security Management have emerged as crucial components of a comprehensive cybersecurity strategy. These powerful tools, once adequately managed, can significantly decrease the risk of security breaches and data leaks. Professionals in various sectors, including financial services, healthcare, travel, DevOps, and SOC teams,……
-
How Hunters International Used the Browser to Breach Enterprises”Š”, “ŠAnd Why They Didn’t See It”¦
How Hunters International Used the Browser to Breach Enterprises”Š”, “ŠAnd Why They Didn’t See It Coming At RSAC 2025, Cato Networks delivered a presentation that SOC teams and CISOs will want to pay attention to: “Suspicious Minds”Š”, “ŠHunting Threats That Don’t Trigger Security Alerts.” The session showcased ransomware campaigns that bypassed traditional detection. In some cases,…
-
DeepTempo Wins Global InfoSec Award for Advanced Threat Identification
It’s been a few weeks since the marketing excesses of the RSA Conference, and a quick glance at any day’s headlines confirms: attackers are collaborating and innovating faster than defenders can keep up. DeepTempo empowers security teams with purpose-built deep learning to detect threats earlier, streamline SOC workflows, and boost overall cyber resilience. While at…
-
A Hyperscaler for Cybersecurity
Tags: access, automation, business, cloud, compliance, computing, control, cybersecurity, data, detection, edr, endpoint, group, infrastructure, intelligence, mssp, network, service, siem, soc, software, threat, tool, updateHyperscalers like AWS and GCP have transformed IT and general tech. Now it’s time for the cybersecurity industry to catch up by shifting to specialized hyperscaler platforms built for security operations (SecOps) at scale. Why the cybersecurity industry needs its own hyperscaler IT hyperscalers evolved to meet the challenges of web-scale computing back in the…
-
News Alert: Halo Security reaches SOC 2 milestone, validating its security controls and practices
Miami, Fla., May 22, 2025, CyberNewsWire, Halo Security, a leading provider of attack surface management and penetration testing services, today announced it has successfully achieved SOC 2 Type 1 compliance following a comprehensive audit by Insight Assurance. This… (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/05/news-alert-halo-security-reaches-soc-2-milestone-validating-its-security-controls-and-practices/
-
Halo Security Achieves SOC 2 Type 1 Compliance, Validating Security Controls for Its Attack Surface Management Platform
Halo Security, a leading provider of attack surface management and penetration testing services, today announced it has successfully achieved SOC 2 Type 1 compliance following a comprehensive audit by Insight Assurance. This certification validates that Halo Security’s security controls and practices are properly designed and implemented to meet the SOC 2 trust principles. >>Security isn’t a destination; it’s…
-
Halo Security Achieves SOC 2 Type 1 Compliance, Validating Security Controls for Its Attack Surface Management Platform
Miami, Florida, 22nd May 2025, CyberNewsWire First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/05/halo-security-achieves-soc-2-type-1-compliance-validating-security-controls-for-its-attack-surface-management-platform/
-
SHARED INTEL QA: Visibility, not volume, reframing detection for the AI-enabled SOC
For years, network security has revolved around the perimeter: firewalls, antivirus, endpoint controls. But as attackers grow more sophisticated, and as operations scatter to the cloud, mobile, and IoT, it’s increasingly what happens inside the network that counts.”¦ (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/05/shared-intel-qa-visibility-not-volume-reframing-detection-for-the-ai-enabled-soc/
-
Threat intelligence platform buyer’s guide: Top vendors, selection advice
Tags: ai, attack, automation, breach, cloud, computing, credentials, crowdstrike, cyber, cybersecurity, dark-web, data, data-breach, deep-fake, detection, dns, edr, email, endpoint, exploit, finance, firewall, fraud, gartner, google, group, guide, identity, incident response, infrastructure, intelligence, kubernetes, law, malicious, malware, microsoft, mitigation, monitoring, network, open-source, phishing, privacy, risk, service, siem, soar, soc, sophos, sql, supply-chain, technology, threat, tool, vpn, vulnerability, zero-dayThe Cybersecurity and Infrastructure Security Agency (CISA) found that since 2023 the majority of exploits were zero days, meaning exploiting heretofore unknown methods. And according to the latest Verizon Data Breach Investigations report (DBIR), the percentage of AI-assisted malicious emails doubled to 10% of the totals they observed over the past two years, making staying…
-
Free to Choose the Right Security for Your Cloud
Is Choosing Cloud Security a Complex Task? From financial services and healthcare to DevOps and SOC teams, businesses across sectors are grappling with the complexity of managing Non-Human Identities (NHIs). NHIs, essentially machine identities, are a critical component of an organization’s cybersecurity. They play a pivotal role in reducing threats by securing both the machine……
-
Cyber! Take your dadgum Medicine!
Learn the Bitter Lesson Bitter Lesson, an essay by one of the creators of reinforcement learning, first published back in 2019, recently made the rounds again now that its author, Professor Richard Sutton, was named a winner of this year’s ACM Turing Award. In it, he points out that general methods have won, again and again,…
-
5 Ways to Put AI To Work in Your SOC (MDR, MXDR, MSIEM, & More)
First seen on scworld.com Jump to article: www.scworld.com/native/5-ways-to-put-ai-to-work-in-your-soc-mdr-mxdr-msiem-more
-
SHARED INTEL QA: AI in the SOC isn’t all about speed, it’s more so about smoothing process
The SOC has long been the enterprise’s first line of defense. But despite years of investment in threat feeds and automation platforms, the same question persists: why does intelligence still struggle to translate into timely action? Related: IBM makes the “¦ (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/05/shared-intel-qa-ai-in-the-soc-isnt-all-about-speed-its-more-so-about-smoothing-process/
-
Sicherheit mit System – Warum ein Managed SOC Ihre IT besser schützt als Virenschutz allein
Tags: socFirst seen on security-insider.de Jump to article: www.security-insider.de/effektiver-schutz-vor-cyberkriminalitaet-mit-managed-soc-a-4dd06b071bbe8a75c63d5950d087d557/
-
[Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
Modern apps move fast”, faster than most security teams can keep up. As businesses rush to build in the cloud, security often lags behind. Teams scan code in isolation, react late to cloud threats, and monitor SOC alerts only after damage is done.Attackers don’t wait. They exploit vulnerabilities within hours. Yet most organizations take days…
-
Building a Resilient SOC Automation Strategy
First seen on scworld.com Jump to article: www.scworld.com/native/building-a-resilient-soc-automation-strategy
-
Security Gamechangers: CrowdStrike’s AI-Native SOC Next Gen SIEM Take Center Stage at RSAC 2025
CrowdStrike introduced several enhancements to its Falcon cybersecurity platform and Falcon Next-Gen SIEM at the RSA Conference 2025, highlighting artificial intelligence, managed threat hunting and operational efficiencies aimed at transforming modern Security Operations Centers (SOC). First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/05/security-gamechangers-crowdstrikes-ai-native-soc-next-gen-siem-take-center-stage-at-rsac-2025/
-
Startup Conifers.ai Courts MSSPs with Agentic AI SOC Platform
First seen on scworld.com Jump to article: www.scworld.com/news/startup-conifers-ai-courts-mssps-with-agentic-ai-soc-platform
-
AI can help the industry finally get SOC automation right
First seen on scworld.com Jump to article: www.scworld.com/perspective/ai-can-help-us-finally-get-soc-automation-right
-
Why Identity Signals Are Replacing IOCs in Threat Intelligence
The CISO’s View: Too Many Alerts, Too Little Context Imagine a SOC analyst under pressure. Their screen is filled with IP addresses, malware hashes, geolocations, login alerts, and thousands of other signals. It’s a flood of noise. IOCs used to be the gold standard for cyber threat detection, but today? Attackers don’t need malware or……
-
BSidesLV24 Proving Ground GEN-Z Critique On SOC 2
Author/Presenter: Charissa Kim Our sincere appreciation to BSidesLV, and the Presenters/Authors for publishing their erudite Security BSidesLV24 content. Originating from the conference’s events located at the Tuscany Suites & Casino; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/05/bsideslv24-proving-ground-gen-z-critique-on-soc-2/
-
Perfection is a Myth. Leverage Isn’t: How Small Teams Can Secure Their Google Workspace
Let’s be honest: if you’re one of the first (or the first) security hires at a small or midsize business, chances are you’re also the unofficial CISO, SOC, IT Help Desk, and whatever additional roles need filling. You’re not running a security department. You are THE security department. You’re getting pinged about RFPs in one…
-
Top cybersecurity products showcased at RSA 2025
Tags: access, ai, attack, automation, awareness, breach, cisco, compliance, control, crowdstrike, cyber, cybersecurity, data, defense, detection, edr, email, firewall, fortinet, framework, identity, incident response, infrastructure, injection, intelligence, login, malicious, open-source, phishing, risk, siem, soc, threat, tool, training, update, vulnerability, zero-trustCisco: Foundational AI Security Model: Cisco introduced its Foundation AI Security Model, an open-source framework designed to standardize safety protocols across AI models and applications. This initiative aims to address the growing concerns around AI security and ensure Safer AI deployments. Cisco also unveiled new agentic AI features in its XDR and Splunk platforms, along…
-
‘SOC der Zukunft” – Mehr KI, mehr Automatisierung: Cisco erweitert Security-Portfolio
First seen on security-insider.de Jump to article: www.security-insider.de/mehr-ki-mehr-automatisierung-cisco-erweitert-security-portfolio-a-f1c9c34f88c052ff7a31dbb92c516267/
-
SANS Top 5: Cyber Has Busted Out of the SOC
This year’s top cyber challenges include cloud authorization sprawl, ICS cyberattacks and ransomware, a lack of cloud logging, and regulatory constraints keeping defenders from fully utilizing AI’s capabilities. First seen on darkreading.com Jump to article: www.darkreading.com/cloud-security/sans-top5-cyber-broken-out-soc

