Tag: soc
-
Agentic AI affecting the world of the SOC
While many are tempted to lean on agentic AI, the rush to do so is potentially creating more risk First seen on computerweekly.com Jump to article: www.computerweekly.com/microscope/news/366639051/Agentic-AI-affecting-the-world-of-the-SOC
-
The 20 Coolest Security Operations, Risk And Threat Intelligence Companies Of 2026: The Security 100
CRN’s Security 100 list of the coolest security operations, risk and threat intelligence companies includes providers of agentic SOC tools, SIEM platforms and threat intelligence feeds. First seen on crn.com Jump to article: www.crn.com/news/security/2026/the-20-coolest-security-operations-risk-and-threat-intelligence-companies-of-2026-the-security-100
-
Discipline is the new power move in cybersecurity leadership
Tags: automation, cyber, cybersecurity, data, group, incident response, intelligence, metric, risk, risk-management, service, siem, soc, technology, threat, tool, update, vulnerability, vulnerability-managementHow to do more with less: 1. Review contracts, renegotiate them or change the operations to a new partner Scope, service-level agreements and performance metrics should be revisited because many contracts were established under different risk profiles, urgency and pricing conditions. Modernizing contracts to focus on outcomes rather than activities, revalidating pricing and service assumptions…
-
Microsoft Defender update lets SOC teams manage, vet response tools
Microsoft introduced library management in Microsoft Defender to help security analysts working with live response manage scripts and tools they use to triage, investigate and … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/18/microsoft-defender-library-management-interface/
-
Microsoft Defender update lets SOC teams manage, vet response tools
Microsoft introduced library management in Microsoft Defender to help security analysts working with live response manage scripts and tools they use to triage, investigate and … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/18/microsoft-defender-library-management-interface/
-
Microsoft Defender update lets SOC teams manage, vet response tools
Microsoft introduced library management in Microsoft Defender to help security analysts working with live response manage scripts and tools they use to triage, investigate and … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/18/microsoft-defender-library-management-interface/
-
Microsoft Defender update lets SOC teams manage, vet response tools
Microsoft introduced library management in Microsoft Defender to help security analysts working with live response manage scripts and tools they use to triage, investigate and … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/18/microsoft-defender-library-management-interface/
-
Cyber attacks enabled by basic failings, Palo Alto analysis finds
Changing the paradigm: Unit 42’s answer to this endless cycle of attackers always being one step ahead of defenders is to change the paradigm: cybersecurity has become so specialized, it says, that the answer is to use a managed service built from the ground up to counter real rather than abstract threats.With that in mind,…
-
Is Your GRC Program Really Reducing Risk?
CISO Sean Atkinson on Moving From ‘GRC Theater’ to Continuous GRC Engineering. As NIST, ISO, SOC 2, NIS2 and DORA expand compliance pressure, many organizations are optimizing for audit success instead of risk reduction. Sean Atkinson warns that “GRC theater” creates false confidence. Adversaries operate continuously and so should GRC engineering, he said. First seen…
-
Data Minimization Is Still an Underrated Security Control
Why Reducing Data Volume Matters More Than Ever for SOCs and CISOs Data minimization is often perceived as a constraint on innovation. In reality, it is the ultimate enabler of resilience. It reduces the impact of breaches, weakens ransomware leverage, improves SOC efficiency and secures the AI frontier. First seen on govinfosecurity.com Jump to article:…
-
Mate Security Introduces the Security Context Graph, an Approach to Smarter SOCs
New York, USA, 17th February 2026, CyberNewswire First seen on hackread.com Jump to article: hackread.com/mate-security-introduces-the-security-context-graph-an-approach-to-smarter-socs/
-
My Day Getting My Hands Dirty with an NDR System
My objectiveThe role of NDR in SOC workflowsStarting up the NDR systemHow AI complements the human responseWhat else did I try out?What could I see with NDR that I wouldn’t otherwise?Am I ready to be a network security analyst now?My objectiveAs someone relatively inexperienced with network threat hunting, I wanted to get some hands-on experience…
-
Webinar: How Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster
Cloud attacks move fast, faster than most incident response teams.In data centers, investigations had time. Teams could collect disk images, review logs, and build timelines over days. In the cloud, infrastructure is short-lived. A compromised instance can disappear in minutes. Identities rotate. Logs expire. Evidence can vanish before analysis even begins.Cloud forensics is fundamentally First…
-
With CISOs stretched thin, re-envisioning enterprise risk may be the only fix
Tags: access, ai, application-security, business, cio, ciso, cloud, compliance, control, cyber, cybersecurity, data, fraud, governance, grc, group, identity, infrastructure, jobs, monitoring, privacy, RedTeam, risk, soc, supply-chain, vulnerabilityStructural changes necessary: Flavio Villanustre, CISO for the LexisNexis Risk Solutions Group, says many organizations have already made the structural changes necessary to address the rising importance, and specialization, of cybersecurity and risk functions.”The breadth and depth of information security and cybersecurity have increased so significantly over the past two decades that it drove a…
-
AI Is Making Security More Agile: Highlights from ChiBrrCon 2026
ChiBrrCon 2026 tackled AI, resilience, and operational agility in enterprise security. Learn what top speakers shared on SOC modernization and architectural risk. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/ai-is-making-security-more-agile-highlights-from-chibrrcon-2026/
-
Don’t Settle for an AI SOAR: The Case for Autonomous SOC Operations
Why D3 Morpheus’s alert-native autonomy delivers true L2+ investigation, self-healing integrations, and faster time-to-value without the engineering burden. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/dont-settle-for-an-ai-soar-the-case-for-autonomous-soc-operations/
-
From MSSP to Autonomous SOC: Replacing Linear Headcount with Infinite Compute
MSSPs optimize for SLA metrics, not security outcomes. Autonomous SOC platforms like Morpheus can replace them at 10x lower cost. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/from-mssp-to-autonomous-soc-replacing-linear-headcount-with-infinite-compute/
-
From MSSP to Autonomous SOC: Replacing Linear Headcount with Infinite Compute
MSSPs optimize for SLA metrics, not security outcomes. Autonomous SOC platforms like Morpheus can replace them at 10x lower cost. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/from-mssp-to-autonomous-soc-replacing-linear-headcount-with-infinite-compute/
-
Why PAM Implementations Struggle
Privileged Access Management (PAM) is widely recognized as a foundational security control for Zero Trust, ransomware prevention, and compliance with frameworks such as NIST, ISO 27001, and SOC 2. Yet despite heavy investment, many organizations struggle to realize the promised value of PAM. Projects stall, adoption remains low, and security teams are left managing complex systems that deliver limited risk reduction. ……
-
Turning IBM QRadar Alerts into Action with Criminal IP
Criminal IP now integrates with IBM QRadar SIEM and SOAR to bring external IP-based threat intelligence directly into detection and response workflows. See how risk scoring and automated enrichment help SOC teams prioritize high-risk IPs and accelerate investigations without leaving QRadar. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/turning-ibm-qradar-alerts-into-action-with-criminal-ip/
-
Turning IBM QRadar Alerts into Action with Criminal IP
Criminal IP now integrates with IBM QRadar SIEM and SOAR to bring external IP-based threat intelligence directly into detection and response workflows. See how risk scoring and automated enrichment help SOC teams prioritize high-risk IPs and accelerate investigations without leaving QRadar. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/turning-ibm-qradar-alerts-into-action-with-criminal-ip/
-
Turning IBM QRadar Alerts into Action with Criminal IP
Criminal IP now integrates with IBM QRadar SIEM and SOAR to bring external IP-based threat intelligence directly into detection and response workflows. See how risk scoring and automated enrichment help SOC teams prioritize high-risk IPs and accelerate investigations without leaving QRadar. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/turning-ibm-qradar-alerts-into-action-with-criminal-ip/
-
Can AI-driven architecture significantly enhance SOC team efficiency?
How Can Non-Human Identities Revolutionize Cybersecurity? Have you ever considered the challenges that arise when managing thousands of machine identities? Where organizations migrate to the cloud, the need for robust security systems becomes paramount. Enter Non-Human Identities (NHIs), the unsung heroes of cybersecurity that can revolutionize how secure our clouds are. Managing NHIs, which… First…
-
Reducing Alert Fatigue Using AI: From Overwhelmed SOCs to Autonomous Precision
How Artificial Intelligence Transforms Security Operations Security Operations Centers (SOCs) face a growing operational challenge: overwhelming alert volumes. Modern enterprise environments generate thousands of security notifications daily across endpoint, network, identity, cloud, and application layers. This continuous stream of alerts creates what the industry describes as alert fatigue, a condition where analysts are overwhelmed by…
-
The SIEM Maturity Framework Workbook (v1.0): A Practical Scoring Tool for Security Analytics Platforms
Over the last few weeks I published a post on the architectural and operational gaps that created the new wave of SIEM and AI SOC vendors. A bunch of people asked the same follow-up question: “Ok, but how do I evaluate vendors consistently without falling back into feature checklists and marketing claims?” So I turned……
-
Arctic Wolf targets mid-market security gap in APAC
Following the launch of its full portfolio in Malaysia, the SOC provider discusses the security challenges facing lean IT teams, the value of supplier neutrality, and its roadmap for AI and ransomware protection First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366639032/Arctic-Wolf-targets-mid-market-security-gap-in-APAC
-
How to Stay on Top of Future Threats With a Cutting-Edge SOC
CISOs should focus on harnessing and securing AI and building new skills among their people. Vision and change management can transform security. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/stay-top-future-threats-cutting-edge-soc
-
How Top CISOs Solve Burnout and Speed up MTTR without Extra Hiring
Why do SOC teams keep burning out and missing SLAs even after spending big on security tools? Routine triage piles up, senior specialists get dragged into basic validation, and MTTR climbs, while stealthy threats still find room to slip through. Top CISOs have realized the solution isn’t hiring more people or stacking yet another tool…
-
Gartner-Prognose: Die sechs wichtigsten Cybersicherheits-Trends für 2026
Tags: ai, awareness, business, compliance, computing, cyberattack, cybersecurity, cyersecurity, framework, gartner, governance, resilience, risk, soc, tool, trainingLesen Sie, mit welchen Cybersecurity-Trends sich Unternehmen in diesem Jahr beschäftigen sollten.Auch im Jahr 2026 bleibt die Cybersicherheitslage angespannt. Doch was sind die wichtigsten Themen, Risiken und Chancen, mit denen sich Security-Entscheider aktuell befassen sollten?Das Marktforschungsunternehmen Gartner hat dazu folgende sechs Trends ermittelt: KI-Agenten werden zunehmend von Mitarbeitern und Entwicklern genutzt, wodurch neue Angriffsflächen entstehen.…
-
Radicl Brings In $31M to Push AI-Driven SOC Toward Autonomy
Series A Funding Accelerates AI-Native Detection and Response Roadmap. With $31 million in new Series A funding, Radicl plans to accelerate development of an autonomous security operations platform for midmarket organizations. CEO Chris Petersen said the company is focused on improving detection accuracy and trust to enable automated response at scale. First seen on govinfosecurity.com…

