Tag: soc
-
ISMS.online Expands Compliance Portfolio with SOC 2 Offering
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/news/isms-online-expands-compliance-portfolio-with-soc-2-offering
-
20+ RSAC Things (and Places) You Should Know
by
in SecurityNewsMaximize your RSA Conference 2025 experience with insider tips, must-visit spots, and a special invitation to see Morpheus AI SOC at Booth N-4400. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/04/20-rsac-things-and-places-you-should-know/
-
Top 20 Best Open-Source SOC Tools in 2025
by
in SecurityNewsAs cyber threats continue to evolve, Security Operations Centers (SOCs) require robust tools to detect, analyze, and respond to incidents effectively. Open-source SOC tools provide cost-effective, customizable, and community-supported solutions for organizations of all sizes. In this article, we’ll explore 20 notable open-source SOC tools for 2025, categorized by their functionalities. What Is An Open-Source…
-
AI Adoption in the Enterprise: Breaking Through the Security and Compliance Gridlock
by
in SecurityNewsAI holds the promise to revolutionize all sectors of enterpriseーfrom fraud detection and content personalization to customer service and security operations. Yet, despite its potential, implementation often stalls behind a wall of security, legal, and compliance hurdles.Imagine this all-too-familiar scenario: A CISO wants to deploy an AI-driven SOC to handle the overwhelming volume of security…
-
Microsoft’s AI tool catches critical GRUB2, U-boot bootloader flaws
by
in SecurityNews
Tags: access, ai, control, cybersecurity, exploit, firmware, flaw, Hardware, microsoft, mitigation, monitoring, risk, soc, supply-chain, tool, update, vulnerability, vulnerability-management, zero-dayAI-powered discovery changes the cybersecurity landscape: Microsoft’s Security Copilot tool significantly accelerated the vulnerability identification process, with a particular focus on filesystem implementations due to their high vulnerability potential.”Using Security Copilot, we were able to identify potential security issues in bootloader functionalities, focusing on filesystems due to their high vulnerability potential,” the blog stated. “This…
-
Neues eBook ‘Transformation und Compliance im SOC” – Wie ein modernes SOC der Compliance helfen kann
by
in SecurityNewsFirst seen on security-insider.de Jump to article: www.security-insider.de/cybersicherheit-socs-compliance-transformation-a-9d2ac6a33f80f7ee4fc4714cad929b84/
-
AI promises to create a ‘SIEM Renaissance’ in the SOC
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/perspective/ai-promises-to-create-a-siem-renaissance-in-the-soc
-
From checkbox to confidence: Why passing the audit isn’t the endgame
by
in SecurityNews“We passed the audit. No idea how, but we passed.” If that sentence sounds familiar or worse, relatable it’s time for a serious look in the mirror. Every year, companies across industries breathe a collective sigh of relief when the auditors give the thumbs-up. The SOC 2, ISO 27001, PCI DSS pick…The post From checkbox…
-
Nir Zuk: Google’s Multi-Cloud Security Strategy Won’t Work
Palo Alto Networks CTO Nir Zuk predicts Google’s security push through its $32 billion buy of Wiz won’t succeed, as customers are reluctant to buy multi-cloud tools from cloud vendors. Zuk details how adversaries use LLMs at scale and how Palo Alto is unifying SOC tools under its Cortex platform. First seen on govinfosecurity.com Jump…
-
Student-Powered SOCs Train Security’s Next Generation
by
in SecurityNewsUniversity security operations centers that hire and train students are a boon to state and local governments while giving much-needed Tier 1 cybersecurity training to undergraduates. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/student-powered-socs-train-security-next-generation
-
KI-Agenten erobern die Cybersicherheitsbranche
by
in SecurityNews
Tags: ai, cloud, cyberattack, cyersecurity, edr, governance, identity, intelligence, mail, microsoft, phishing, soar, soc, strategy, threat, tool, update, vulnerabilityMicrosoft führt KI-Agenten ein, um die Cybersicherheit angesichts zunehmender Bedrohungen zu automatisieren.KI-Agenten, die in der Lage sind, Code auszuführen und Websuchen durchzuführen, gewinnen in der gesamten Tech-Branche an Bedeutung. Ein weiteres Feld, welches immer wichtiger wird, ist automatisierte Sicherheit.Diese Tools sind geeignet für Aufgaben wiePhishing-Erkennung,Datenschutz undIdentitätsmanagement.Hierbei handelt es sich um Bereiche, in denen Angreifer unvermindert…
-
Evaluating AI for Security Operations
by
in SecurityNewsSOCs without AI aren’t just behind the curve, they’re fundamentally outmatched in the asymmetric battle against sophisticated threat actors. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/evaluating-ai-for-security-operations/
-
Evaluating AI for Security Operations
by
in SecurityNewsSOCs without AI aren’t just behind the curve, they’re fundamentally outmatched in the asymmetric battle against sophisticated threat actors. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/evaluating-ai-for-security-operations/
-
How AI and automation are reshaping security leadership
by
in SecurityNewsThe contemporary SOC is transforming as it starts to realize the benefits of GenAI and utilize the manifestations of autonomous agentic AI, according to Tines. Additionally, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/18/security-leaders-ai-automation-benefits/
-
Inside the Morpheus AI-Assisted Workspace: Bridging the Gap Between Complex Data and Rapid Response
by
in SecurityNewsMorpheus’s AI-augmented SOC workspace streamlines Jinja transformations, automates Python scripts, and uncovers deep incident insights. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/inside-the-morpheus-ai-assisted-workspace-bridging-the-gap-between-complex-data-and-rapid-response/
-
Inside the Morpheus AI-Assisted Workspace: Bridging the Gap Between Complex Data and Rapid Response
by
in SecurityNewsMorpheus’s AI-augmented SOC workspace streamlines Jinja transformations, automates Python scripts, and uncovers deep incident insights. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/inside-the-morpheus-ai-assisted-workspace-bridging-the-gap-between-complex-data-and-rapid-response/
-
Inside the Morpheus AI-Assisted Workspace: Bridging the Gap Between Complex Data and Rapid Response
by
in SecurityNewsMorpheus’s AI-augmented SOC workspace streamlines Jinja transformations, automates Python scripts, and uncovers deep incident insights. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/inside-the-morpheus-ai-assisted-workspace-bridging-the-gap-between-complex-data-and-rapid-response/
-
Inside the Morpheus AI-Assisted Workspace: Bridging the Gap Between Complex Data and Rapid Response
by
in SecurityNewsMorpheus’s AI-augmented SOC workspace streamlines Jinja transformations, automates Python scripts, and uncovers deep incident insights. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/inside-the-morpheus-ai-assisted-workspace-bridging-the-gap-between-complex-data-and-rapid-response/
-
AI-Augmented SOC: The Evolution of Security Operations
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/native/ai-augmented-soc-the-evolution-of-security-operations
-
Tel Aviv Stock Exchange CISO: Making Better Use of Your SIEM
by
in SecurityNewsIf rule writing for SIEMs isn’t managed properly, it can lead to false positives and misconfigurations, which create extra work for the SOC team. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/tel-aviv-stock-exchange-ciso-making-better-use-of-your-siem
-
IntelMQ: Open-source tool for collecting and processing security feeds
by
in SecurityNewsIntelMQ is an open-source solution designed to help IT security teams (including CERTs, CSIRTs, SOCs, and abuse departments) streamline the collection and processing of … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/17/intelmq-open-source-collecting-processing-security-feeds/
-
Invisible C2″Š”, “Šthanks to AI-powered techniques
by
in SecurityNews
Tags: ai, api, attack, breach, business, chatgpt, cloud, communications, control, cyberattack, cybersecurity, data, defense, detection, dns, edr, email, encryption, endpoint, hacker, iot, LLM, malicious, malware, ml, monitoring, network, office, openai, powershell, service, siem, soc, strategy, threat, tool, update, vulnerability, zero-trustInvisible C2″Š”, “Šthanks to AI-powered techniques Just about every cyberattack needs a Command and Control (C2) channel”Š”, “Ša way for attackers to send instructions to compromised systems and receive stolen data. This gives us all a chance to see attacks that are putting us at risk. LLMs can help attackers avoid signature based detection Traditionally, C2…
-
AI-Powered Profitability: How Autonomous SOC Drives MSSP Margin Growth
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/native/ai-powered-profitability-how-autonomous-soc-drives-mssp-margin-growth
-
HMRC looks to upgrade SOC with advanced SIEM tech
by
in SecurityNewsHMRC issues a request for information notice ahead of opening up bids for a new security information and event management project that aims to reinforce its ability to respond to cyber threats First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366620679/HMRC-looks-to-upgrade-SOC-with-advanced-SIEM-tech
-
Security operations centers are fundamental to cybersecurity, here’s how to build one
by
in SecurityNews
Tags: access, ai, automation, ciso, compliance, cyber, cybersecurity, data, detection, edr, endpoint, governance, group, guide, iam, identity, incident response, intelligence, jobs, network, risk, service, siem, soar, soc, threat, toolBreakdown of SOC tools and technologies: During their Shmoocon talk, Wyler and his colleague James “Pope” Pope, senior manager of governance, risk, and compliance at Corelight, offered a list of the fundamental technologies CISOs should consider when building or outsourcing a SOC.These essential tools include: EDR (endpoint detection and response) EDR is a security solution…
-
How can I secure NHIs during rapid deployment cycles?
by
in SecurityNewsAre Your Machine Identities Adequately Protected During Rapid Deployment Cycles? Organizations across industries are leveraging the unprecedented benefits of the cloud. Financial services, healthcare, travel, and tech-driven sectors like DevOps and SOC teams are especially invested. However, this adoption isn’t without its unique set of challenges. One pertinent question is, how can organizations secure Non-Human……
-
MSSP Market Update: Intezer Expands AI SOC Capabilities
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/news/mssp-market-update-intezer-expands-ai-soc-capabilities
-
Unified Intelligence vs. Agent Sprawl: Rethinking AI-Powered Security Operations
by
in SecurityNewsAgentic AI excels when APIs are impractical, but enterprise SOCs usually have robust APIs. Learn why unified solutions like Morpheus AI outperform agentic approaches. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/unified-intelligence-vs-agent-sprawl-rethinking-ai-powered-security-operations/