Tag: soc
-
3 Data-Based Shifts Defining AI-Native Cybersecurity Stacks
The SOC is changing faster than you realize. Discover the 3 data-based shifts defining the AI-native cybersecurity era: from upstream detection to AI-powered triage and enrichment. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/3-data-based-shifts-defining-ai-native-cybersecurity-stacks/
-
6 Minutes and a Prayer: The Math Your SOC Doesn’t Want You to See
Your SOC can’t triage every alert, the math proves it. See why 75% of alerts go uninvestigated and how AI-autonomous triage closes the gap. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/6-minutes-and-a-prayer-the-math-your-soc-doesnt-want-you-to-see/
-
Fig Security Raises $30M to Modernize SOC Infrastructure
Series A Funding Aims to Give Security Teams Visibility Into Complex SecOps Stacks. Fig Security has raised $30 million in Series A funding to help organizations modernize their SOC infrastructure. The startup said CISOs lack visibility into complex SecOps pipelines spanning SIEMs, data lakes and automation tools, which can lead to silent failures that undermine…
-
Why AI, Zero Trust, and modern security require deep visibility
Tags: ai, cyber, cybersecurity, data, detection, incident response, intelligence, soc, strategy, threat, tool, zero-trust72% of organizations say NAV is essential for proactive threat hunting and reactive incident response69% say a NAV solution is vital to their threat detection and incident response processThis isn’t about adding more gadgets to the SOC. It’s about strengthening the foundation that the SOC stands on.When visibility is weak, every advanced capability becomes unstable:AI…
-
The 10-hour problem: How visibility gaps are burning out the SOC
An alert firesThe context is partialThe data is dispersedThe logs are incompleteThe analyst starts correlating manually This is the invisible cost of poor visibility.Every alert becomes a puzzle, and analysts become professional puzzle-solvers. But puzzles don’t scale. Not when attacks move faster than your reconstruction speed.The hidden cost of insufficient NAVThe Forrester study shows that…
-
Talion Expands Governance-Aligned Agentic SOC as Board Cyber Scrutiny Intensifies
Talion, a leading Managed Security Service Provider (MSSP) forged out of BAE Systems, today announced that under the new leadership of CEO, Keven Knight, it has expanded its governance-aligned Agentic SOC model, embedding executive-level oversight and accountability directly into its managed cyber defence services. The enhanced model is designed to align real-time security operations with…
-
Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow
Every CISO knows the uncomfortable truth about their Security Operations Center: the people most responsible for catching threats in real time are the people with the least experience. Tier 1 analysts sit at the front line of detection, and yet they are also the most vulnerable to the cognitive and organizational pressures that quietly erode…
-
The Definitive Guide to Migrating from Cortex XSOAR to the Autonomous SOC
Enterprise SOC teams at Big Four firms, global financial institutions, and elite MSSPs are leaving Cortex XSOAR for D3 Morpheus. This guide covers why organizations are making the switch, how the platforms compare capability-by-capability, and what a migration looks like in practice. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/the-definitive-guide-to-migrating-from-cortex-xsoar-to-the-autonomous-soc/
-
How CISOs can build a resilient workforce
Tags: ai, automation, ciso, communications, cyber, cybersecurity, data, infrastructure, jobs, monitoring, network, risk, service, skills, soc, software, strategy, technology, threat, tool, trainingBurnout leads to job dissatisfaction: Burnout is an ongoing concern for many CISOs and their teams, especially when unpredictable events can trigger workload spikes, burnout can escalate fast. “It’s something that can overwhelm pretty quickly,” Ford says.Industry surveys continue to flash red on persistent burnout that leads to job dissatisfaction. The ISC2 study found almost…
-
Cyberattacks on Hospitals Cost Lives. Here’s How to Fight Back at Machine Speed.
Healthcare is the most targeted industry for cyberattacks, and ransomware-related delays in care have been linked to patient deaths. D3 Morpheus gives healthcare SOC teams an AI-autonomous platform that correlates alerts across the entire security stack, identifies ransomware kill chains in progress, and produces the audit-ready evidence trail that HIPAA and HITECH demand. First seen…
-
MSP Strategic Defense: Building Compliance on Dynamic Attack Surface Reduction
Tags: attack, compliance, control, cyber, defense, dora, HIPAA, insurance, ISO-27001, msp, nis-2, PCI, regulation, soc, supply-chain<div cla Compliance expectations across SMB markets are rising as supply chain regulations and cyber insurance requirements raise the baseline for security maturity. Regulatory standards such as CIS Controls v8, the NIS2 Directive, ISO 27001, SOC 2, PCI DSS, HIPAA, Cyber Essentials, CMMC 2.0, DORA, and the Essential Eight now shape what that baseline looks…
-
How to Cut MTTR by Improving Threat Visibility in Your SOC
How better threat visibility and real-time intelligence reduce MTTR, improve SOC response speed, and strengthen resilience through faster detection and containment. First seen on hackread.com Jump to article: hackread.com/how-to-cut-mttr-improving-threat-visibility-soc/
-
The farmers and the mercenaries: Rethinking the ‘human layer’ in security
Tags: access, attack, authentication, awareness, ciso, control, cybersecurity, defense, detection, intelligence, jobs, monitoring, risk, soc, threat, tool, trainingThe evidence is already in: This isn’t a theoretical complaint, it shows up in research on how real SOCs work. A study by the University of Oxford based on surveys and interviews with SOC practitioners found they “confirmed the high” false-positive rates of tools in use, and that many “false positives” are actually benign triggers…
-
CrowdStrike touts agentic SOC to tackle security woes
By embedding AI agents across its platform, CrowdStrike is looking to help security teams automate repetitive security tasks, enabling them to focus on complex and stealthier threats that could slip under the radar First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366639370/CrowdStrike-touts-agentic-SOC-to-tackle-security-woes
-
Deepwatch® Expands SIEM-Agnostic Guardian MDR Platform with Support for Securonix®
Deepwatch Operationalizes Securonix with NEXAAgentic AI and 24/7 Elite SOC Palo Alto, CA”, February 24, 2026″, Deepwatch, the leader in Precision MDR powered by AI + humans, today announced native support for Securonix, a six-time Leader in the Gartner® Magic Quadrant for SIEM, within the Deepwatch Guardian MDR Platform. The integration operationalizes Securonix’s Unified Defense…
-
BlueVoyant deckt neue Rift Brigantine-Angriffskampagne auf
Um sich vor der neuen Kampagne zu schützen, empfehlen die SOC- und FTC-Forensiker von BlueVoyant Unternehmen, ihre Software ausschließlich aus verifizierten Herstellerquellen oder internen Repositories zu beziehen. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/bluevoyant-deckt-neue-rift-brigantine-angriffskampagne-auf/a43807/
-
Realistische Einschätzung 2026: Wie erklärbare KI das moderne SOC neu gestaltet
Die anfängliche Euphorie um KI-gesteuerte Security Operations Center (SOC) wich nach zahlreichen Fehlalarmen und Automatisierungsfehlern einer realistischeren Sicht: Über 80 % der Unternehmen berichten, dass generische KI-Lösungen kaum nennenswerte Ergebnisse gebracht haben. Sicherheitsteams bevorzugen mittlerweile erklärbare, assistive KI, die nachvollziehbare Empfehlungen liefert und das menschliche Urteilsvermögen unterstützt, statt Black-Box-Automatisierung, die zu Vertrauensverlust und ineffizienter… First…
-
Anthropic’s Claude Code Security rollout is an industry wakeup call
Anchors security posture to the model: However, those assurances didn’t make all concerns evaporate. “The moment those vibe coders plug a foundation model into their CI pipeline, their entire security posture is no longer anchored only to the company’s code,” I-Gentic AI CEO Zahra Timsah pointed out.”It is anchored to the current behavior of that model.…
-
Why SOCs are moving toward autonomous security operations in 2026
The modern security operations center faces a crisis of scale that human effort cannot fix. With alert volumes exponentially growing and threat actors automating their … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/24/socs-autonomous-security-operations-strategies/
-
NASA repurposes Mars Helicopter’s ancient Snapdragon SoC to help Perseverance rover navigate
Tags: socUpgrade allows robot to travel ‘potentially unlimited distances’ without phoning home for help First seen on theregister.com Jump to article: www.theregister.com/2026/02/23/perseverance_rover_soc_navigation_upgrade/
-
So ticken KI-Agenten für Cybersicherheit
Immer mehr Security-Operation-Centers (SOC) setzen im Kampf gegen Hacker und Downtimes auf die Hilfe künstlicher Intelligenz. KI-Agenten, die wie SOC-Teams miteinander autonom kollaborieren, sind in diesem Zusammenhang die neueste Evolutionsstufe. Ontinue wirft einen Blick unter die Haube solcher Multi-Agenten-Systeme.”‹ Multi-Agenten-Systeme (MAS), bestehend aus hochspezialisierten KI-Agenten, die im Verbund miteinander arbeiten, sind vor allem im Cybersecurity-Kontext…
-
How are SOC teams empowered by Non-Human Identities
Can SOC Teams Really Rely on Non-Human Identities for Cybersecurity? SOC (Security Operations Center) teams are continually challenged to adapt and respond to emerging cybersecurity vulnerabilities. When threats evolve, traditional security measures can often fall short. This is where Non-Human Identities (NHIs) come into play, offering innovative solutions to bolster security protocols. Understanding the Concept……
-
So ticken KI-Agenten für Cybersicherheit wirklich “‹
Immer mehr Security Operation Centers (SOC) setzen im Kampf gegen Hacker und Downtimes auf die Hilfe künstlicher Intelligenz. KI-Agenten, die wie SOC-Teams miteinander autonom kollaborieren, sind in diesem Zusammenhang die neueste Evolutionsstufe. Ontinue, der führende Experte für Managed Extended Detection and Response (MXDR), wirft einen Blick unter die Haube solcher Multi-Agenten-Systeme. Multi-Agenten-Systeme (MAS), bestehend… First…
-
Dynamic Objects in Active Directory: The Stealthy Threat
Active Directory’s “dynamic objects” feature offers attackers a perfect evasion cloak. These objects automatically self-destruct without a trace, so they allow adversaries to bypass quotas, pollute access lists, and persist in the cloud, leaving forensic investigators with nothing to analyze. Key takeaways The threat: Dynamic objects self-delete without leaving any traces, or “tombstones” in AD…
-
AI in the SOC: Why Complete Autonomy Is the Wrong Goal
Dan Petrillo, VP of Product at BlueVoyant As artificial intelligence (AI) becomes more deeply embedded in security operations, a divide has emerged in how its role is defined. Some argue the security operations centre (SOC) should be fully autonomous, with AI replacing human analysts. Others believe that augmentation is the right path, using AI to support and extend existing teams. Augmentation probably reflects…
-
AI in the SOC: Why Complete Autonomy Is the Wrong Goal
Dan Petrillo, VP of Product at BlueVoyant As artificial intelligence (AI) becomes more deeply embedded in security operations, a divide has emerged in how its role is defined. Some argue the security operations centre (SOC) should be fully autonomous, with AI replacing human analysts. Others believe that augmentation is the right path, using AI to support and extend existing teams. Augmentation probably reflects…
-
Engineering for the Inevitable: Managing Downstream Failures in Security Data Pipelines
Learn how to prevent 50% of detection failures caused by log delivery chain issues. Master persistent queuing, schema drift mitigation, and automated recovery for zero data loss SOC operations. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/engineering-for-the-inevitable-managing-downstream-failures-in-security-data-pipelines/

