Tag: soc
-
From reactive to proactive: Redefining incident response with unified, cloud-native XDR
by
in SecurityNewsIn today’s rapidly evolving threat landscape, cybersecurity is a constant game of cat and mouse. The average security operations center (SOC) team receives 4,484 alerts every day and can spend up to 3 hours manually triaging to understand which signals represent a genuine threat and which are just noise.However, this model traps SOCs in a…
-
Fighting on the New Front Line of Security with Snowflake and LogLMs
by
in SecurityNews
Tags: access, ai, attack, cyber, cybersecurity, data, detection, finance, incident response, intelligence, malicious, mitre, monitoring, network, siem, soc, threat, toolTempo”Š”, “Ša Snowflake Native App”Š”, “Šharnesses AI and Log Language Models for Proactive Cybersecurity Cybersecurity attackers are innovating, challenging traditional security measures, and pushing organizations to seek more innovative solutions. Tempo, a Snowflake Native App that revolutionizes cybersecurity using AI-powered proactive security, sees even novel attacks. By leveraging Log Language Models (LogLMs), which are a…
-
4 Ways To Unleash Speed and Efficiency in the SOC
by
in SecurityNewsWith the right tools, your SOC will soon run just like a world-class race car pit crew to deliver on the mission that matters the most: Stopping breaches. First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/4-ways-to-unleash-speed-and-efficiency-in-the-soc/
-
XDR provider Arctic Wolf buys BlackBerry’s Cylance suite
by
in SecurityNews
Tags: ai, business, ceo, ciso, cybersecurity, detection, edr, endpoint, government, infrastructure, office, phone, risk, service, soc, technologyUS provider Arctic Wolf has struck a deal to buy BlackBerry’s Cylance endpoint security suite, which it will integrate into its Aurora extended detection and response (XDR) platform.Arctic Wolf said this morning that if the deal is approved by regulators, the company will be able to offer one of the largest open XDR security platforms…
-
Empower Your SOC Teams with Cloud-Native Security Solutions
by
in SecurityNewsCan Cloud-Native Security Be a Game-Changer for Your SOC Teams? In today’s complex digital landscape, organizations are increasingly challenged to protect their data while ensuring compliance with evolving cybersecurity regulations. From finance to healthcare, businesses are recognizing the need for a more comprehensive approach to securing machine identities, especially Non-Human Identities (NHIs). Could effective NHI……
-
Anton’s Security Blog Quarterly Q4 2024
by
in SecurityNews
Tags: ai, automation, ciso, cloud, cyber, defense, detection, edr, google, governance, incident response, metric, office, security-incident, siem, soc, threat, vulnerability, vulnerability-management, zero-trustAmazingly, Medium has fixed the stats so my blog/podcast quarterly is back to life. As before, this covers both Anton on Security and my posts from Google Cloud blog, and our Cloud Security Podcast (subscribe). Meta AI creation, steampunk theme Top 10 posts with the most lifetime views (excluding paper announcement blogs): Security Correlation Then…
-
Top tips for CISOs running red teams
by
in SecurityNewsRed team is the de facto standard in offensive security testing when you want to know how all security investments, from technological controls to user training to response procedures, work together when subjected to a targeted attack. Unlike penetration testing, which aims to comprehensively assess a system, or purple team, which assesses detection and response…
-
31 of the Top MSSPs Use D3 for SOC Automation: Here’s Why
by
in SecurityNewsWhy do 31 of the top 250 MSSPs choose D3? From seamless onboarding to cutting alert noise by 99%, D3’s automation revolutionizes managed security. See how. First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/31-of-the-top-mssps-use-d3-for-soc-automation-heres-why/
-
Gen AI use cases rising rapidly for cybersecurity, but concerns remain
by
in SecurityNews
Tags: ai, attack, automation, awareness, ceo, ciso, compliance, control, cybersecurity, data, detection, finance, framework, fraud, GDPR, governance, grc, group, guide, Hardware, HIPAA, incident response, intelligence, international, malware, middle-east, monitoring, phishing, privacy, RedTeam, regulation, risk, risk-assessment, risk-management, soc, software, strategy, technology, threat, tool, training, usaGenerative AI is being embedded into security tools at a furious pace as CISOs adopt the technology internally to automate manual processes and improve productivity. But research also suggests this surge in gen AI adoption comes with a fair amount of trepidation among cybersecurity professionals, which CISOs must keep in mind when weaving gen AI…
-
Why SOC Roles Need to Evolve to Attract a New Generation
by
in SecurityNewsThe cybersecurity industry faces a growing crisis in attracting and retaining SOC analysts. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/soc-roles-evolve-attract-new-generation
-
A Framework for Human-AI Partnership in the SOC
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/perspective/a-framework-for-human-ai-partnership-in-the-soc
-
Burnout in SOCs: How AI Can Help Analysts Focus on High-Value Tasks
by
in SecurityNewsSOC analysts, vital to cybersecurity, face burnout due to exhausting workloads, risking their well-being and the effectiveness of organizational defenses. Security Operations Center (SOC) analyst burnout is a very real problem. These are some of the most important cybersecurity professionals out there, and many of them are being worked to exhaustion. Amidst an already overstretched…
-
Alleviating Alert Fatigue with an MSSP
by
in SecurityNewsBy Euan Carswell, SOC Team Lead at Barrier Networks Everyone can relate to the 7AM alarm call. You can be in a deep sleep when suddenly your ears are met with an incessant pinging that won’t stop until you muster the energy to hit snooze. This is a morning ritual for many. The alarm clock…
-
EU enacts new laws to strengthen cybersecurity defenses and coordination
by
in SecurityNews
Tags: ai, compliance, cyber, cybersecurity, data, defense, framework, healthcare, infrastructure, law, network, penetration-testing, privacy, regulation, risk, service, soc, technology, threat, vulnerabilityThe European Union has enacted two new laws to bolster its cybersecurity defenses and coordination mechanisms. The measures, part of the cybersecurity legislative package, include the Cyber Solidarity Act and amendments to the Cybersecurity Act (CSA).These steps aim to improve the EU’s ability to detect, prepare for, and respond to cyber threats while fostering uniformity…
-
Working in critical infrastructure? Boost your effectiveness with these cybersecurity certifications
by
in SecurityNews
Tags: attack, automation, awareness, china, cisa, communications, compliance, control, cyber, cybersecurity, defense, finance, germany, governance, government, healthcare, HIPAA, incident response, infrastructure, international, jobs, network, PCI, privacy, ransomware, resilience, risk, risk-management, russia, sans, service, skills, soc, supply-chain, technology, training, ukraine, update, warfareHybrid warfare between nation-states is imperilling critical infrastructure around the world, both physically and electronically. Since the start of the Ukraine-Russia conflict, hybrid cyber/physical attacks on satellite and communications, energy, transportation, water, and other critical sectors have spread across Europe and beyond.Chinese perpetrators are actively infiltrating telecommunications networks in the US and abroad, according to…
-
IT/OT Security Operations Center Zusammen gegen die Cyberrisiken der Zukunft
by
in SecurityNews
Tags: socVertrauen ist neben der Expertise ein weiterer zentraler Faktor bei der Partnerwahl. Die ISO-Zertifizierung 27001 weist etwa aus, dass ein IT/OT-SOC-B… First seen on infopoint-security.de Jump to article: www.infopoint-security.de/it-ot-security-operations-center-zusammen-gegen-die-cyberrisiken-der-zukunft/a37223/
-
BlueVoyant stellt innovative Cyber Defense Plattform vor
by
in SecurityNewsDas Unternehmen hat kürzlich ein neues Security Operations (SOC) und Customer Experience Center in Leeds, England, eröffnet, das zum bestehenden SOC i… First seen on infopoint-security.de Jump to article: www.infopoint-security.de/bluevoyant-stellt-innovative-cyber-defense-plattform-vor/a37819/
-
indevis baut SOC- und MDR-Sparte erfolgreich aus
by
in SecurityNews2024 konnte indevis die erfolgreichen MDR-Services weiter ausbauen und wurde als ‘Market Challenger in der Kategorie ‘Managed Security Services SOC (M… First seen on infopoint-security.de Jump to article: www.infopoint-security.de/indevis-baut-soc-und-mdr-sparte-erfolgreich-aus/a37982/
-
Telekom verstärkt Cyberabwehr durch Ausbau des SOCs
by
in SecurityNews
Tags: socDas Telekom-SOC in Bonn ist eines der größten seiner Art in Europa und arbeitet mit weiteren Sicherheitszentren in 13 Ländern zusammen, um einen weltw… First seen on infopoint-security.de Jump to article: www.infopoint-security.de/telekom-verstaerkt-cyberabwehr-durch-ausbau-des-socs/a38235/
-
Neue Studie zeigt zunehmendes Misstrauen der SOC-Teams zu ihren Security-Tools
by
in SecurityNews60 % der SOC-Fachleute sagen, dass Sicherheitsanbieter sie mit sinnlosen Warnmeldungen überfluten, um für Sicherheitsverletzungen nicht zur Verantwort… First seen on infopoint-security.de Jump to article: www.infopoint-security.de/neue-studie-zeigt-zunehmendes-misstrauen-der-soc-teams-zu-ihren-security-tools/a38541/
-
Cyberangriffe auf Rekordhoch Ist KI die Rettung für überlastete Sicherheitsteams?
by
in SecurityNewsDie Flut von Alarmen und die Vielzahl von Sicherheitstools erschweren es den SOCs zunehmend, echte Bedrohungen zu erkennen und darauf zu reagieren. Es ist äußerst besorgniserregend, dass 71 Prozent der Befragten befürchten, einen echten Angriff zu übersehen. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/cyberangriffe-auf-rekordhoch-ist-ki-die-rettung-fuer-ueberlastete-sicherheitsteams/a39098/
-
Dynamischere Cyber-Resilienz – Rein ins SOC: Was Speicheradmins wissen müssen
by
in SecurityNewsFirst seen on security-insider.de Jump to article: www.security-insider.de/optimierung-der-speicherinfrastruktur-durch-neues-soc-verstaendnis-a-c08124bb525896e3d740678bde87c3cd/
-
How to Read, Review, and Analyze a SOC 2 Report
by
in SecurityNewsDiscover how to maximize the value of your SOC 2 report to enhance your business’s security posture and strengthen trust. First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/11/how-to-read-review-and-analyze-a-soc-2-report/
-
Top 7 Vanta Alternatives to Consider in 2025
by
in SecurityNewsThe Rise of Compliance-Centric Platforms Vanta was developed to help organizations achieve SOC 2 compliance quickly. Compliance management platforms have gained significant traction in the market. For startups and smaller businesses, these certifications are often crucial for breaking into markets where enterprise clients expect certain compliance standards as baseline requirements. Vanta offers robust integrations that……
-
Deploy a SOC using Kali Linux in AWS
by
in SecurityNewsThe Kali SOC in AWS project enables the deployment of a Security Operations Center (SOC) in AWS, utilizing the Kali Linux toolset for purple team activities. This environment … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/11/25/kali-soc-aws/
-
Bidirectional communication via polyrhythms and shuffles: Without Jon the beat must go on
by
in SecurityNewsThe Threat Source Newsletter is back! William Largent discusses bidirectional communication in the SOC, and highlights new Talos research including the discovery of PXA Stealers. First seen on blog.talosintelligence.com Jump to article: blog.talosintelligence.com/bidirectional-communication-via-polyrhythms-and-shuffles-without-jon-the-beat-must-go-on/
-
It’s Near-Unanimous: AI, ML Make the SOC Better
by
in SecurityNewsEfficiency is the name of the game for the security operations center, and 91% of cybersecurity pros say artificial intelligence and machine learning are winning that game. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/survey-report-ai-ml-make-soc-better
-
SOC 2 Compliance Audit: Safeguarding Your Business’s Data
by
in SecurityNewsAre you a service organization seeking an audit to gain customers’ trust? Or maybe you are looking to attract prospective clients by proving how serious you are with customers’ data. If that is the case, you have come to the right place. Introducing the SOC 2 audit think of it as a thorough check-up… First…
-
5 Ways Behavioral Analytics is Revolutionizing Incident Response
by
in SecurityNewsBehavioral analytics, long associated with threat detection (i.e. UEBA or UBA), is experiencing a renaissance. Once primarily used to identify suspicious activity, it’s now being reimagined as a powerful post-detection technology that enhances incident response processes. By leveraging behavioral insights during alert triage and investigation, SOCs can transform their workflows to become more First seen…