Tag: soc
-
4 Ways To Unleash Speed and Efficiency in the SOC
With the right tools, your SOC will soon run just like a world-class race car pit crew to deliver on the mission that matters the most: Stopping breaches. First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/4-ways-to-unleash-speed-and-efficiency-in-the-soc/
-
XDR provider Arctic Wolf buys BlackBerry’s Cylance suite
Tags: ai, business, ceo, ciso, cybersecurity, detection, edr, endpoint, government, infrastructure, office, phone, risk, service, soc, technologyUS provider Arctic Wolf has struck a deal to buy BlackBerry’s Cylance endpoint security suite, which it will integrate into its Aurora extended detection and response (XDR) platform.Arctic Wolf said this morning that if the deal is approved by regulators, the company will be able to offer one of the largest open XDR security platforms…
-
Empower Your SOC Teams with Cloud-Native Security Solutions
Can Cloud-Native Security Be a Game-Changer for Your SOC Teams? In today’s complex digital landscape, organizations are increasingly challenged to protect their data while ensuring compliance with evolving cybersecurity regulations. From finance to healthcare, businesses are recognizing the need for a more comprehensive approach to securing machine identities, especially Non-Human Identities (NHIs). Could effective NHI……
-
Anton’s Security Blog Quarterly Q4 2024
Tags: ai, automation, ciso, cloud, cyber, defense, detection, edr, google, governance, incident response, metric, office, security-incident, siem, soc, threat, vulnerability, vulnerability-management, zero-trustAmazingly, Medium has fixed the stats so my blog/podcast quarterly is back to life. As before, this covers both Anton on Security and my posts from Google Cloud blog, and our Cloud Security Podcast (subscribe). Meta AI creation, steampunk theme Top 10 posts with the most lifetime views (excluding paper announcement blogs): Security Correlation Then…
-
Top tips for CISOs running red teams
Red team is the de facto standard in offensive security testing when you want to know how all security investments, from technological controls to user training to response procedures, work together when subjected to a targeted attack. Unlike penetration testing, which aims to comprehensively assess a system, or purple team, which assesses detection and response…
-
31 of the Top MSSPs Use D3 for SOC Automation: Here’s Why
Why do 31 of the top 250 MSSPs choose D3? From seamless onboarding to cutting alert noise by 99%, D3’s automation revolutionizes managed security. See how. First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/31-of-the-top-mssps-use-d3-for-soc-automation-heres-why/
-
Gen AI use cases rising rapidly for cybersecurity, but concerns remain
Tags: ai, attack, automation, awareness, ceo, ciso, compliance, control, cybersecurity, data, detection, finance, framework, fraud, GDPR, governance, grc, group, guide, Hardware, HIPAA, incident response, intelligence, international, malware, middle-east, monitoring, phishing, privacy, RedTeam, regulation, risk, risk-assessment, risk-management, soc, software, strategy, technology, threat, tool, training, usaGenerative AI is being embedded into security tools at a furious pace as CISOs adopt the technology internally to automate manual processes and improve productivity. But research also suggests this surge in gen AI adoption comes with a fair amount of trepidation among cybersecurity professionals, which CISOs must keep in mind when weaving gen AI…
-
Why SOC Roles Need to Evolve to Attract a New Generation
The cybersecurity industry faces a growing crisis in attracting and retaining SOC analysts. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/soc-roles-evolve-attract-new-generation
-
A Framework for Human-AI Partnership in the SOC
First seen on scworld.com Jump to article: www.scworld.com/perspective/a-framework-for-human-ai-partnership-in-the-soc
-
Burnout in SOCs: How AI Can Help Analysts Focus on High-Value Tasks
SOC analysts, vital to cybersecurity, face burnout due to exhausting workloads, risking their well-being and the effectiveness of organizational defenses. Security Operations Center (SOC) analyst burnout is a very real problem. These are some of the most important cybersecurity professionals out there, and many of them are being worked to exhaustion. Amidst an already overstretched…
-
Alleviating Alert Fatigue with an MSSP
By Euan Carswell, SOC Team Lead at Barrier Networks Everyone can relate to the 7AM alarm call. You can be in a deep sleep when suddenly your ears are met with an incessant pinging that won’t stop until you muster the energy to hit snooze. This is a morning ritual for many. The alarm clock…
-
EU enacts new laws to strengthen cybersecurity defenses and coordination
Tags: ai, compliance, cyber, cybersecurity, data, defense, framework, healthcare, infrastructure, law, network, penetration-testing, privacy, regulation, risk, service, soc, technology, threat, vulnerabilityThe European Union has enacted two new laws to bolster its cybersecurity defenses and coordination mechanisms. The measures, part of the cybersecurity legislative package, include the Cyber Solidarity Act and amendments to the Cybersecurity Act (CSA).These steps aim to improve the EU’s ability to detect, prepare for, and respond to cyber threats while fostering uniformity…
-
Working in critical infrastructure? Boost your effectiveness with these cybersecurity certifications
Tags: attack, automation, awareness, china, cisa, communications, compliance, control, cyber, cybersecurity, defense, finance, germany, governance, government, healthcare, HIPAA, incident response, infrastructure, international, jobs, network, PCI, privacy, ransomware, resilience, risk, risk-management, russia, sans, service, skills, soc, supply-chain, technology, training, ukraine, update, warfareHybrid warfare between nation-states is imperilling critical infrastructure around the world, both physically and electronically. Since the start of the Ukraine-Russia conflict, hybrid cyber/physical attacks on satellite and communications, energy, transportation, water, and other critical sectors have spread across Europe and beyond.Chinese perpetrators are actively infiltrating telecommunications networks in the US and abroad, according to…
-
IT/OT Security Operations Center Zusammen gegen die Cyberrisiken der Zukunft
Tags: socVertrauen ist neben der Expertise ein weiterer zentraler Faktor bei der Partnerwahl. Die ISO-Zertifizierung 27001 weist etwa aus, dass ein IT/OT-SOC-B… First seen on infopoint-security.de Jump to article: www.infopoint-security.de/it-ot-security-operations-center-zusammen-gegen-die-cyberrisiken-der-zukunft/a37223/
-
BlueVoyant stellt innovative Cyber Defense Plattform vor
Das Unternehmen hat kürzlich ein neues Security Operations (SOC) und Customer Experience Center in Leeds, England, eröffnet, das zum bestehenden SOC i… First seen on infopoint-security.de Jump to article: www.infopoint-security.de/bluevoyant-stellt-innovative-cyber-defense-plattform-vor/a37819/
-
indevis baut SOC- und MDR-Sparte erfolgreich aus
2024 konnte indevis die erfolgreichen MDR-Services weiter ausbauen und wurde als ‘Market Challenger in der Kategorie ‘Managed Security Services SOC (M… First seen on infopoint-security.de Jump to article: www.infopoint-security.de/indevis-baut-soc-und-mdr-sparte-erfolgreich-aus/a37982/
-
Telekom verstärkt Cyberabwehr durch Ausbau des SOCs
Tags: socDas Telekom-SOC in Bonn ist eines der größten seiner Art in Europa und arbeitet mit weiteren Sicherheitszentren in 13 Ländern zusammen, um einen weltw… First seen on infopoint-security.de Jump to article: www.infopoint-security.de/telekom-verstaerkt-cyberabwehr-durch-ausbau-des-socs/a38235/
-
Neue Studie zeigt zunehmendes Misstrauen der SOC-Teams zu ihren Security-Tools
60 % der SOC-Fachleute sagen, dass Sicherheitsanbieter sie mit sinnlosen Warnmeldungen überfluten, um für Sicherheitsverletzungen nicht zur Verantwort… First seen on infopoint-security.de Jump to article: www.infopoint-security.de/neue-studie-zeigt-zunehmendes-misstrauen-der-soc-teams-zu-ihren-security-tools/a38541/
-
Cyberangriffe auf Rekordhoch Ist KI die Rettung für überlastete Sicherheitsteams?
Die Flut von Alarmen und die Vielzahl von Sicherheitstools erschweren es den SOCs zunehmend, echte Bedrohungen zu erkennen und darauf zu reagieren. Es ist äußerst besorgniserregend, dass 71 Prozent der Befragten befürchten, einen echten Angriff zu übersehen. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/cyberangriffe-auf-rekordhoch-ist-ki-die-rettung-fuer-ueberlastete-sicherheitsteams/a39098/
-
Dynamischere Cyber-Resilienz – Rein ins SOC: Was Speicheradmins wissen müssen
First seen on security-insider.de Jump to article: www.security-insider.de/optimierung-der-speicherinfrastruktur-durch-neues-soc-verstaendnis-a-c08124bb525896e3d740678bde87c3cd/
-
How to Read, Review, and Analyze a SOC 2 Report
Discover how to maximize the value of your SOC 2 report to enhance your business’s security posture and strengthen trust. First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/11/how-to-read-review-and-analyze-a-soc-2-report/
-
Top 7 Vanta Alternatives to Consider in 2025
The Rise of Compliance-Centric Platforms Vanta was developed to help organizations achieve SOC 2 compliance quickly. Compliance management platforms have gained significant traction in the market. For startups and smaller businesses, these certifications are often crucial for breaking into markets where enterprise clients expect certain compliance standards as baseline requirements. Vanta offers robust integrations that……
-
Deploy a SOC using Kali Linux in AWS
The Kali SOC in AWS project enables the deployment of a Security Operations Center (SOC) in AWS, utilizing the Kali Linux toolset for purple team activities. This environment … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/11/25/kali-soc-aws/
-
Bidirectional communication via polyrhythms and shuffles: Without Jon the beat must go on
The Threat Source Newsletter is back! William Largent discusses bidirectional communication in the SOC, and highlights new Talos research including the discovery of PXA Stealers. First seen on blog.talosintelligence.com Jump to article: blog.talosintelligence.com/bidirectional-communication-via-polyrhythms-and-shuffles-without-jon-the-beat-must-go-on/
-
It’s Near-Unanimous: AI, ML Make the SOC Better
Efficiency is the name of the game for the security operations center, and 91% of cybersecurity pros say artificial intelligence and machine learning are winning that game. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/survey-report-ai-ml-make-soc-better
-
SOC 2 Compliance Audit: Safeguarding Your Business’s Data
Are you a service organization seeking an audit to gain customers’ trust? Or maybe you are looking to attract prospective clients by proving how serious you are with customers’ data. If that is the case, you have come to the right place. Introducing the SOC 2 audit think of it as a thorough check-up… First…
-
5 Ways Behavioral Analytics is Revolutionizing Incident Response
Behavioral analytics, long associated with threat detection (i.e. UEBA or UBA), is experiencing a renaissance. Once primarily used to identify suspicious activity, it’s now being reimagined as a powerful post-detection technology that enhances incident response processes. By leveraging behavioral insights during alert triage and investigation, SOCs can transform their workflows to become more First seen…
-
Leveraging AI/ML for next-gen SOC environments
Tags: socFirst seen on theregister.com Jump to article: www.theregister.com/2024/10/14/leveraging_aiml_for_nextgen_soc/
-
Embarking on a Compliance Journey? Here’s How Intruder Can Help
Navigating the complexities of compliance frameworks like ISO 27001, SOC 2, or GDPR can be daunting.Luckily, Intruder simplifies the process by helpin… First seen on thehackernews.com Jump to article: thehackernews.com/2024/10/embarking-on-compliance-journey-heres.html

