Tag: soc
-
How AI and automation are reshaping security leadership
The contemporary SOC is transforming as it starts to realize the benefits of GenAI and utilize the manifestations of autonomous agentic AI, according to Tines. Additionally, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/18/security-leaders-ai-automation-benefits/
-
Inside the Morpheus AI-Assisted Workspace: Bridging the Gap Between Complex Data and Rapid Response
Morpheus’s AI-augmented SOC workspace streamlines Jinja transformations, automates Python scripts, and uncovers deep incident insights. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/inside-the-morpheus-ai-assisted-workspace-bridging-the-gap-between-complex-data-and-rapid-response/
-
AI-Augmented SOC: The Evolution of Security Operations
First seen on scworld.com Jump to article: www.scworld.com/native/ai-augmented-soc-the-evolution-of-security-operations
-
Tel Aviv Stock Exchange CISO: Making Better Use of Your SIEM
If rule writing for SIEMs isn’t managed properly, it can lead to false positives and misconfigurations, which create extra work for the SOC team. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/tel-aviv-stock-exchange-ciso-making-better-use-of-your-siem
-
IntelMQ: Open-source tool for collecting and processing security feeds
IntelMQ is an open-source solution designed to help IT security teams (including CERTs, CSIRTs, SOCs, and abuse departments) streamline the collection and processing of … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/17/intelmq-open-source-collecting-processing-security-feeds/
-
Invisible C2″Š”, “Šthanks to AI-powered techniques
Tags: ai, api, attack, breach, business, chatgpt, cloud, communications, control, cyberattack, cybersecurity, data, defense, detection, dns, edr, email, encryption, endpoint, hacker, iot, LLM, malicious, malware, ml, monitoring, network, office, openai, powershell, service, siem, soc, strategy, threat, tool, update, vulnerability, zero-trustInvisible C2″Š”, “Šthanks to AI-powered techniques Just about every cyberattack needs a Command and Control (C2) channel”Š”, “Ša way for attackers to send instructions to compromised systems and receive stolen data. This gives us all a chance to see attacks that are putting us at risk. LLMs can help attackers avoid signature based detection Traditionally, C2…
-
AI-Powered Profitability: How Autonomous SOC Drives MSSP Margin Growth
First seen on scworld.com Jump to article: www.scworld.com/native/ai-powered-profitability-how-autonomous-soc-drives-mssp-margin-growth
-
HMRC looks to upgrade SOC with advanced SIEM tech
HMRC issues a request for information notice ahead of opening up bids for a new security information and event management project that aims to reinforce its ability to respond to cyber threats First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366620679/HMRC-looks-to-upgrade-SOC-with-advanced-SIEM-tech
-
Security operations centers are fundamental to cybersecurity, here’s how to build one
Tags: access, ai, automation, ciso, compliance, cyber, cybersecurity, data, detection, edr, endpoint, governance, group, guide, iam, identity, incident response, intelligence, jobs, network, risk, service, siem, soar, soc, threat, toolBreakdown of SOC tools and technologies: During their Shmoocon talk, Wyler and his colleague James “Pope” Pope, senior manager of governance, risk, and compliance at Corelight, offered a list of the fundamental technologies CISOs should consider when building or outsourcing a SOC.These essential tools include: EDR (endpoint detection and response) EDR is a security solution…
-
How can I secure NHIs during rapid deployment cycles?
Are Your Machine Identities Adequately Protected During Rapid Deployment Cycles? Organizations across industries are leveraging the unprecedented benefits of the cloud. Financial services, healthcare, travel, and tech-driven sectors like DevOps and SOC teams are especially invested. However, this adoption isn’t without its unique set of challenges. One pertinent question is, how can organizations secure Non-Human……
-
MSSP Market Update: Intezer Expands AI SOC Capabilities
First seen on scworld.com Jump to article: www.scworld.com/news/mssp-market-update-intezer-expands-ai-soc-capabilities
-
Unified Intelligence vs. Agent Sprawl: Rethinking AI-Powered Security Operations
Agentic AI excels when APIs are impractical, but enterprise SOCs usually have robust APIs. Learn why unified solutions like Morpheus AI outperform agentic approaches. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/unified-intelligence-vs-agent-sprawl-rethinking-ai-powered-security-operations/
-
BlueVoyant eröffnet hochmodernes Security Operations Centre in Cork, Irland
Tags: socDie Eröffnung des BlueVoyant SOC in Cork ist ein weiterer Schritt in diese Richtung. Es handelt sich um die erste ständige Niederlassung des Unternehmens in Irland. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/bluevoyant-eroeffnet-hochmodernes-security-operations-centre-in-cork-irland/a40038/
-
News alert: Hunters announces ‘Pathfinder AI’ to enhance detection and response in SOC workflows
Boston and Tel Aviv, Mar. 4, 2025, CyberNewswire, Hunters, the leader in next-generation SIEM, today announced Pathfinder AI, a major step toward a more AI-driven SOC. Building on Copilot AI, which is already transforming SOC workflows with LLM-powered… (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/news-alert-hunters-announces-pathfinder-ai-to-enhance-detection-and-response-in-soc-workflows/
-
Pathfinder AI Hunters Announces New AI Capabilities for Smarter SOC Automation
Pathfinder AI expands Hunters’ vision for AI-driven SOCs, introducing Agentic AI for autonomous investigation and response. Hunters, the leader in next-generation SIEM, today announced Pathfinder AI, a major step toward a more AI-driven SOC. Building on Copilot AI, which is already transforming SOC workflows with LLM-powered investigation guidance, Hunters is introducing its Agentic AI vision,…
-
Hunters Announces New AI Capabilities with Pathfinder AI for Smarter SOC Automation
Boston and Tel Aviv, United States, 4th March 2025, CyberNewsWire First seen on hackread.com Jump to article: hackread.com/hunters-announces-new-ai-capabilities-with-pathfinder-ai-for-smarter-soc-automation/
-
News alert: Bubba AI launches Comp AI to help 100,000 startups get SOC 2 compliant by 2032
San Francisco, Calif., Mar. 3, 2025, CyberNewswire, With the growing importance of security compliance for startups, more companies are seeking to achieve and maintain compliance with frameworks like SOC 2, ISO 27001 & GDPR. Bubba AI, Inc. is building… (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/news-alert-bubba-ai-launches-comp-ai-to-help-100000-startups-get-soc-2-compliant-by-2032/
-
Bubba AI, Inc. is launching Comp AI to help 100,000 startups get SOC 2 compliant by 2032
Introducing Comp AI Comp AI is an open-source alternative to GRC automation platforms like Vanta and Drata. The platform includes several key features designed to automate compliance with frameworks such as SOC 2:A built-in risk register to help companies identify, document, and assess potential security risksOut-of-the-box security policies for modern companies, complete with an AI-powered…
-
Bubba AI, Inc. is launching Comp AI to help 100,000 startups get SOC 2 compliant by 2032.
San Francisco, California, 3rd March 2025, CyberNewsWire First seen on hackread.com Jump to article: hackread.com/bubba-ai-inc-is-launching-comp-ai-to-help-100000-startups-get-soc-2-compliant-by-2032/
-
Certain About Your Data Privacy Measures?
Are You Confident in Your Data Privacy Measures? Professionals in financial services in healthcare, travel, DevOps, and SOC teams that managing securitization processes in the cloud; do you feel confident about your data privacy measures? Where marked by increasing cybersecurity threats, the assurance of robust data privacy is no longer a luxury but a necessity….…
-
The compliance illusion: Why your company might be at risk despite passing audits
For many CISOs, compliance can feel like a necessary evil and a false sense of security. While frameworks like ISO 27001, SOC 2, and PCI DSS offer structured guidelines, they … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/02/26/compliance-security-illustion/
-
Empowering SOC Teams with Open and Seamless API Integration
First seen on scworld.com Jump to article: www.scworld.com/native/empowering-soc-teams-with-open-and-seamless-api-integration
-
Introducing Morpheus: Autonomous Investigation, Triage, and Response for SOC Teams
Learn how Morpheus ASOC brings AI-driven autonomy to security operations, enabling 100% alert coverage and faster investigations. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/introducing-morpheus-autonomous-investigation-triage-and-response-for-soc-teams/
-
What is SIEM? Improving security posture through event log data
Tags: access, ai, api, automation, ciso, cloud, compliance, data, defense, detection, edr, endpoint, firewall, fortinet, gartner, google, guide, ibm, infrastructure, intelligence, kubernetes, LLM, microsoft, mitigation, mobile, monitoring, network, openai, regulation, risk, router, security-incident, service, siem, soar, soc, software, threat, toolAt its core, a SIEM is designed to parse and analyze various log files, including firewalls, servers, routers and so forth. This means that SIEMs can become the central “nerve center” of a security operations center, driving other monitoring functions to resolve the various daily alerts.Added to this data are various threat intelligence feeds that…
-
Fortinet Extends Scope and Reach of SOC Platform
Fortinet today expanded the scope of its platform for security operations center (SOC) teams to add generative artificial intelligence (GenAI) capabilities, along with additional integrations with third-party platforms and other Fortinet services. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/fortinet-extends-scope-and-reach-of-soc-platform/
-
10 Key SOC Challenges and How AI Addresses Them
SOC challenges like alert fatigue, skill shortages and slow response impact cybersecurity. AI-driven solutions enhance SOC efficiency, automation… First seen on hackread.com Jump to article: hackread.com/10-key-soc-challenges-and-how-ai-addresses-them/
-
Agentic-AI hilft SOC-Teams, sich auf kritische Bedrohungen zu konzentrieren und schneller zu reagieren
Crowdstrike gab die allgemeine Verfügbarkeit von Charlotte-AI-Detection-Triage bekannt, einer bahnbrechenden Lösung auf dem Gebiet der Agentic-AI-basierten Cybersicherheit. Unter Verwendung einer vom Kunden definierten begrenzten Autonomie triagiert Charlotte-AI Sicherheitsmeldungen mit einer Genauigkeit von über 98 % und eliminiert so durchschnittlich mehr als 40 Stunden manueller Arbeit pro Woche, was die Skalierung von SOC-Operationen und die Beschleunigung…
-
How to evaluate and mitigate risks to the global supply chain
Tags: access, business, ceo, ciso, communications, compliance, control, cyberattack, cybersecurity, data, framework, governance, government, intelligence, international, ISO-27001, kaspersky, microsoft, mitigation, monitoring, office, resilience, risk, risk-assessment, risk-management, russia, service, soc, software, supply-chain, technology, threat, tool, update, vulnerabilityMaintain a diversified supply chain: Organizations that source from international technology suppliers need to ensure they are not overly reliant on a single vendor, single region or even a single technology. Maintaining a diversified supply chain can mitigate costly disruptions from a cyberattack or vulnerability involving a key supplier, or from disruptions tied to regulatory…
-
4 Wege aus der Security-Akronymhölle
Gefangen im Buchstabensud?Bevor Elon Musk zum Trump-Sidekick mutierte, wurde er in erster Linie als visionärer Entrepreneur wahrgenommen. Damals, im Jahr 2010, ließ er den Mitarbeitern seines Raumfahrtunternehmens SpaceX ein Memo zukommen. Darin kritisierte er den übermäßigen, internen Gebrauch von Abkürzungen in gewohnt ausdrucksstarkem Stil: ‘Bei SpaceX gibt es eine schleichende Tendenz, erfundene Akronyme zu nutzen.…

