Tag: soc
-
AI promises to create a ‘SIEM Renaissance’ in the SOC
First seen on scworld.com Jump to article: www.scworld.com/perspective/ai-promises-to-create-a-siem-renaissance-in-the-soc
-
From checkbox to confidence: Why passing the audit isn’t the endgame
“We passed the audit. No idea how, but we passed.” If that sentence sounds familiar or worse, relatable it’s time for a serious look in the mirror. Every year, companies across industries breathe a collective sigh of relief when the auditors give the thumbs-up. The SOC 2, ISO 27001, PCI DSS pick…The post From checkbox…
-
Nir Zuk: Google’s Multi-Cloud Security Strategy Won’t Work
Palo Alto Networks CTO Nir Zuk predicts Google’s security push through its $32 billion buy of Wiz won’t succeed, as customers are reluctant to buy multi-cloud tools from cloud vendors. Zuk details how adversaries use LLMs at scale and how Palo Alto is unifying SOC tools under its Cortex platform. First seen on govinfosecurity.com Jump…
-
Student-Powered SOCs Train Security’s Next Generation
University security operations centers that hire and train students are a boon to state and local governments while giving much-needed Tier 1 cybersecurity training to undergraduates. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/student-powered-socs-train-security-next-generation
-
KI-Agenten erobern die Cybersicherheitsbranche
Tags: ai, cloud, cyberattack, cyersecurity, edr, governance, identity, intelligence, mail, microsoft, phishing, soar, soc, strategy, threat, tool, update, vulnerabilityMicrosoft führt KI-Agenten ein, um die Cybersicherheit angesichts zunehmender Bedrohungen zu automatisieren.KI-Agenten, die in der Lage sind, Code auszuführen und Websuchen durchzuführen, gewinnen in der gesamten Tech-Branche an Bedeutung. Ein weiteres Feld, welches immer wichtiger wird, ist automatisierte Sicherheit.Diese Tools sind geeignet für Aufgaben wiePhishing-Erkennung,Datenschutz undIdentitätsmanagement.Hierbei handelt es sich um Bereiche, in denen Angreifer unvermindert…
-
Evaluating AI for Security Operations
SOCs without AI aren’t just behind the curve, they’re fundamentally outmatched in the asymmetric battle against sophisticated threat actors. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/evaluating-ai-for-security-operations/
-
How AI and automation are reshaping security leadership
The contemporary SOC is transforming as it starts to realize the benefits of GenAI and utilize the manifestations of autonomous agentic AI, according to Tines. Additionally, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/18/security-leaders-ai-automation-benefits/
-
Inside the Morpheus AI-Assisted Workspace: Bridging the Gap Between Complex Data and Rapid Response
Morpheus’s AI-augmented SOC workspace streamlines Jinja transformations, automates Python scripts, and uncovers deep incident insights. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/inside-the-morpheus-ai-assisted-workspace-bridging-the-gap-between-complex-data-and-rapid-response/
-
AI-Augmented SOC: The Evolution of Security Operations
First seen on scworld.com Jump to article: www.scworld.com/native/ai-augmented-soc-the-evolution-of-security-operations
-
Tel Aviv Stock Exchange CISO: Making Better Use of Your SIEM
If rule writing for SIEMs isn’t managed properly, it can lead to false positives and misconfigurations, which create extra work for the SOC team. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/tel-aviv-stock-exchange-ciso-making-better-use-of-your-siem
-
IntelMQ: Open-source tool for collecting and processing security feeds
IntelMQ is an open-source solution designed to help IT security teams (including CERTs, CSIRTs, SOCs, and abuse departments) streamline the collection and processing of … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/17/intelmq-open-source-collecting-processing-security-feeds/
-
Invisible C2″Š”, “Šthanks to AI-powered techniques
Tags: ai, api, attack, breach, business, chatgpt, cloud, communications, control, cyberattack, cybersecurity, data, defense, detection, dns, edr, email, encryption, endpoint, hacker, iot, LLM, malicious, malware, ml, monitoring, network, office, openai, powershell, service, siem, soc, strategy, threat, tool, update, vulnerability, zero-trustInvisible C2″Š”, “Šthanks to AI-powered techniques Just about every cyberattack needs a Command and Control (C2) channel”Š”, “Ša way for attackers to send instructions to compromised systems and receive stolen data. This gives us all a chance to see attacks that are putting us at risk. LLMs can help attackers avoid signature based detection Traditionally, C2…
-
AI-Powered Profitability: How Autonomous SOC Drives MSSP Margin Growth
First seen on scworld.com Jump to article: www.scworld.com/native/ai-powered-profitability-how-autonomous-soc-drives-mssp-margin-growth
-
HMRC looks to upgrade SOC with advanced SIEM tech
HMRC issues a request for information notice ahead of opening up bids for a new security information and event management project that aims to reinforce its ability to respond to cyber threats First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366620679/HMRC-looks-to-upgrade-SOC-with-advanced-SIEM-tech
-
Security operations centers are fundamental to cybersecurity, here’s how to build one
Tags: access, ai, automation, ciso, compliance, cyber, cybersecurity, data, detection, edr, endpoint, governance, group, guide, iam, identity, incident response, intelligence, jobs, network, risk, service, siem, soar, soc, threat, toolBreakdown of SOC tools and technologies: During their Shmoocon talk, Wyler and his colleague James “Pope” Pope, senior manager of governance, risk, and compliance at Corelight, offered a list of the fundamental technologies CISOs should consider when building or outsourcing a SOC.These essential tools include: EDR (endpoint detection and response) EDR is a security solution…
-
How can I secure NHIs during rapid deployment cycles?
Are Your Machine Identities Adequately Protected During Rapid Deployment Cycles? Organizations across industries are leveraging the unprecedented benefits of the cloud. Financial services, healthcare, travel, and tech-driven sectors like DevOps and SOC teams are especially invested. However, this adoption isn’t without its unique set of challenges. One pertinent question is, how can organizations secure Non-Human……
-
MSSP Market Update: Intezer Expands AI SOC Capabilities
First seen on scworld.com Jump to article: www.scworld.com/news/mssp-market-update-intezer-expands-ai-soc-capabilities
-
Unified Intelligence vs. Agent Sprawl: Rethinking AI-Powered Security Operations
Agentic AI excels when APIs are impractical, but enterprise SOCs usually have robust APIs. Learn why unified solutions like Morpheus AI outperform agentic approaches. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/unified-intelligence-vs-agent-sprawl-rethinking-ai-powered-security-operations/
-
BlueVoyant eröffnet hochmodernes Security Operations Centre in Cork, Irland
Tags: socDie Eröffnung des BlueVoyant SOC in Cork ist ein weiterer Schritt in diese Richtung. Es handelt sich um die erste ständige Niederlassung des Unternehmens in Irland. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/bluevoyant-eroeffnet-hochmodernes-security-operations-centre-in-cork-irland/a40038/
-
News alert: Hunters announces ‘Pathfinder AI’ to enhance detection and response in SOC workflows
Boston and Tel Aviv, Mar. 4, 2025, CyberNewswire, Hunters, the leader in next-generation SIEM, today announced Pathfinder AI, a major step toward a more AI-driven SOC. Building on Copilot AI, which is already transforming SOC workflows with LLM-powered… (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/news-alert-hunters-announces-pathfinder-ai-to-enhance-detection-and-response-in-soc-workflows/
-
Pathfinder AI Hunters Announces New AI Capabilities for Smarter SOC Automation
Pathfinder AI expands Hunters’ vision for AI-driven SOCs, introducing Agentic AI for autonomous investigation and response. Hunters, the leader in next-generation SIEM, today announced Pathfinder AI, a major step toward a more AI-driven SOC. Building on Copilot AI, which is already transforming SOC workflows with LLM-powered investigation guidance, Hunters is introducing its Agentic AI vision,…
-
Hunters Announces New AI Capabilities with Pathfinder AI for Smarter SOC Automation
Boston and Tel Aviv, United States, 4th March 2025, CyberNewsWire First seen on hackread.com Jump to article: hackread.com/hunters-announces-new-ai-capabilities-with-pathfinder-ai-for-smarter-soc-automation/
-
News alert: Bubba AI launches Comp AI to help 100,000 startups get SOC 2 compliant by 2032
San Francisco, Calif., Mar. 3, 2025, CyberNewswire, With the growing importance of security compliance for startups, more companies are seeking to achieve and maintain compliance with frameworks like SOC 2, ISO 27001 & GDPR. Bubba AI, Inc. is building… (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/news-alert-bubba-ai-launches-comp-ai-to-help-100000-startups-get-soc-2-compliant-by-2032/
-
Bubba AI, Inc. is launching Comp AI to help 100,000 startups get SOC 2 compliant by 2032
Introducing Comp AI Comp AI is an open-source alternative to GRC automation platforms like Vanta and Drata. The platform includes several key features designed to automate compliance with frameworks such as SOC 2:A built-in risk register to help companies identify, document, and assess potential security risksOut-of-the-box security policies for modern companies, complete with an AI-powered…
-
Bubba AI, Inc. is launching Comp AI to help 100,000 startups get SOC 2 compliant by 2032.
San Francisco, California, 3rd March 2025, CyberNewsWire First seen on hackread.com Jump to article: hackread.com/bubba-ai-inc-is-launching-comp-ai-to-help-100000-startups-get-soc-2-compliant-by-2032/
-
Certain About Your Data Privacy Measures?
Are You Confident in Your Data Privacy Measures? Professionals in financial services in healthcare, travel, DevOps, and SOC teams that managing securitization processes in the cloud; do you feel confident about your data privacy measures? Where marked by increasing cybersecurity threats, the assurance of robust data privacy is no longer a luxury but a necessity….…
-
The compliance illusion: Why your company might be at risk despite passing audits
For many CISOs, compliance can feel like a necessary evil and a false sense of security. While frameworks like ISO 27001, SOC 2, and PCI DSS offer structured guidelines, they … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/02/26/compliance-security-illustion/
-
Empowering SOC Teams with Open and Seamless API Integration
First seen on scworld.com Jump to article: www.scworld.com/native/empowering-soc-teams-with-open-and-seamless-api-integration
-
What is SIEM? Improving security posture through event log data
Tags: access, ai, api, automation, ciso, cloud, compliance, data, defense, detection, edr, endpoint, firewall, fortinet, gartner, google, guide, ibm, infrastructure, intelligence, kubernetes, LLM, microsoft, mitigation, mobile, monitoring, network, openai, regulation, risk, router, security-incident, service, siem, soar, soc, software, threat, toolAt its core, a SIEM is designed to parse and analyze various log files, including firewalls, servers, routers and so forth. This means that SIEMs can become the central “nerve center” of a security operations center, driving other monitoring functions to resolve the various daily alerts.Added to this data are various threat intelligence feeds that…

