Tag: soc
-
What is anomaly detection? Behavior-based analysis for cyber threats
by
in SecurityNewsa priori the bad thing that you’re looking for,” Bruce Potter, CEO and founder of Turngate, tells CSO. “It’ll just show up because it doesn’t look like anything else or doesn’t look like it’s supposed to. People have been tilting at that windmill for a long time, since the 1980s, trying to figure out what…
-
Andesite Launches Its Bionic SOC for Human-AI Collaboration
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/news/andesite-launches-its-bionic-soc-for-human-ai-collaboration
-
MSSP Market Update: ArmorPoint Teams With SentinelOne for AI SOC Automation
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/news/mssp-market-update-armorpoint-teams-with-sentinelone-for-ai-soc-automation
-
Security compliance firm Drata acquires SafeBase for $250M
by
in SecurityNewsDrata, a security compliance automation platformthat helps companies adhere to frameworks such as SOC 2 and GDPR, has acquired software security review startup SafeBase for $250 million. SafeBase co-founders Al Yang (CEO) and Adar Arnon (CTO) will retain their roles, and SafeBase will continue to offer a standalone product while bringing its core solutions to…
-
The Current AI Revolution Will (Finally) Transform Your SOC
by
in SecurityNewsArtificial intelligence (AI) is profoundly transforming cybersecurity, reimagining detection through remediation. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/the-current-ai-revolution-will-finally-transform-your-soc/
-
Exciting Advances in Privileged Access Management
by
in SecurityNewsWhy should we be excited about Privileged Access Management? Have you ever pondered the gravity of the implications of not managing Non-Human Identities (NHIs) and their Secrets in your company’s cybersecurity strategy? The rapid digitization of industries such as healthcare, financial services, travel, DevOps, and SOC teams makes securing machine identities an area of utmost……
-
SOC 2® Type 2: Preparing for Your First Audit
by
in SecurityNewsAs a business leader, you know the stakes are high when it comes to data security. Whether you’re a SaaS company, a fintech startup, or a growing enterprise serving clients with stringent compliance requirements, achieving SOC 2® Type 2 certification is a critical step toward earning and maintaining your customers’ trust. But how do you……
-
AI SOC Analysts: Propelling SecOps into the future
by
in SecurityNewsTriaging and investigating alerts is central to security operations. As SOC teams strive to keep up with ever-increasing alert volumes and complexity, modernizing SOC automation strategies with AI has emerged as a critical solution. This blog explores how an AI SOC Analyst transforms alert management, addressing key SOC challenges while enabling faster investigations and responses.Security…
-
Humans are the Beating Heart of the Autonomous SOC
by
in SecurityNewsUltimately, the goal of the autonomous SOC is to create a more efficient and effective security environment where human analysts and AI work together to achieve a higher level of security than either could achieve alone. Working together, each improves the other. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/humans-are-the-beating-heart-of-the-autonomous-soc/
-
SOC vs MSSP: Which is Right for Your Business?
One of the most pivotal decisions an organization faces is whether to build an in-house Security Operations Center (SOC) or outsource security operations to a Managed Security Service Provider (MSSP). While the choice may seem straightforward at first glance, the long-term implications”, on finances, operations, and risk management”, are anything but simple. Like all things…
-
NSFOCUS Licensed for SOC and Pentest Service in Malaysia in Accordance with Cyber Security Act 2024
by
in SecurityNewsSanta Clara, Calif. January 23, 2025 NSFOCUS, a global provider of intelligent hybrid security solutions, today announced that it has received two security service licenses from the National Cyber Security Agency (NACSA) of Malaysia, being one of the first licensed companies that can provide two crucial services in Malaysia: Managed SOC (Security Operations Center)…The post…
-
Cybersecurity is tough: 4 steps leaders can take now to reduce team burnout
by
in SecurityNews
Tags: ai, attack, breach, business, ciso, compliance, control, corporate, cybercrime, cybersecurity, group, incident response, international, jobs, risk, soc, tactics, threatWorking in cybersecurity is only getting harder. Cybercriminals continue to up their game as security teams scramble to catch up with attack tactics and techniques. Organizations put near-impossible demands on their security departments, often with little or no support.The “always-on” nature of many roles in cybersecurity (from SOC analyst to incident response to the CISO)…
-
Externe SOCs für Rundumschutz im Mittelstand
by
in SecurityNews
Tags: socUnternehmen stehen zunehmend unter Druck, sich in einer dynamischen Bedrohungslandschaft zu behaupten, Krisen vorzubeugen und ihre Daten zu schützen. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/externe-socs-im-mittelstand
-
Security Update: Exabeam Enhances SOC Platform for Organizations, MSSPs
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/news/security-update-exabeam-enhances-soc-platform-for-organizations-mssps
-
A Brief Guide for Dealing with ‘Humanless SOC’ Idiots
by
in SecurityNewsimage by Meta.AI lampooning humanless SOC My former “colleagues” have written several serious pieces of research about why a SOC without humans will never happen (“Predict 2025: There Will Never Be an Autonomous SOC”, “The “Autonomous SOC” Is A Pipe Dream”, “Stop Trying To Take Humans Out Of Security Operations”). But I wanted to write…
-
Stop wasting money on ineffective threat intelligence: 5 mistakes to avoid
by
in SecurityNews
Tags: business, ciso, compliance, cyber, cybersecurity, data, detection, edr, finance, group, incident response, infrastructure, intelligence, jobs, malware, monitoring, risk, risk-management, siem, soc, strategy, tactics, technology, threat, tool, update, vulnerability, vulnerability-managementStrong capabilities in cyber threat intelligence (CTI) can help take a cybersecurity program to the next level on many different fronts. When organizations choose quality sources of threat intelligence that are relevant to their technology environments and their business context, these external sources can not only power swifter threat detection but also help leaders better…
-
Exabeam Enhances SOC Platform for Organizations, MSSPs
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/news/exabeam-enhances-soc-platform-for-organizations-mssps
-
New Paper: “Future of SOC: Transform the ‘How’” (Paper 5)
by
in SecurityNewsAfter a long, long, long writing effort “¦ eh “¦ break, we are ready with our 5th Deloitte and Google Cloud Future of the SOC paper “Future of SOC: Transform the ‘How’.” As a reminder (and I promise you do need it; it has been years”¦), the previous 4 papers are: “New Paper: “Future of the SOC: Evolution or…
-
Maintaining SOC 2 Compliance: A Strategic Approach for Businesses
by
in SecurityNewsExplore this blog to discover how a strategic approach can help your SaaS business maintain SOC 2 compliance effectively. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/maintaining-soc-2-compliance-a-strategic-approach-for-businesses/
-
SOC Scalability: How AI Supports Growth Without Overloading Analysts
by
in SecurityNewsScaling up a security operations center (SOC) is inevitable for many organizations. How AI supports growth without overloading analysts. Scaling up a security operations center (SOC) is inevitable for many organizations. Although it might sting, keeping pace with business growth, increased threat volume and complexity, or compliance and regulatory demands requires enhancing and expanding SOC…
-
Partnerschaft All for One und Secuinfra – Im Baukastenprinzip zum eigenen SOC
by
in SecurityNews
Tags: socFirst seen on security-insider.de Jump to article: www.security-insider.de/im-baukastenprinzip-zum-eigenen-soc-a-4503eb0bb780b4c10e788a0a0bbe3c49/
-
SOAR buyer’s guide: 11 security orchestration, automation, and response products, and how to choose
by
in SecurityNews
Tags: access, ai, api, attack, automation, business, chatgpt, cisco, cloud, compliance, container, cybersecurity, data, detection, edr, endpoint, firewall, fortinet, gartner, google, group, guide, Hardware, ibm, incident response, infrastructure, intelligence, jobs, LLM, malware, mandiant, marketplace, microsoft, mitigation, monitoring, network, okta, risk, saas, security-incident, service, siem, soar, soc, software, technology, threat, tool, training, vulnerability, vulnerability-management, zero-daySecurity orchestration, automation, and response (SOAR) has undergone a major transformation in the past few years. Features in each of the words in its description that were once exclusive to SOAR have bled into other tools. For example, responses can be found now in endpoint detection and response (EDR) tools. Orchestration is now a joint…
-
Meet the WAF Squad – Impart Security
by
in SecurityNewsIntroduction Web applications and APIs are critical parts of your attack surface, but managing WAFs has never been easy. False positives, rule tuning, risks of production outages, and log analysis – all of this work has made WAF historically difficult to operationalize. Well, that time is over. Meet Impart’s WAF Squad – a five-member squad…
-
Microsoft Sentinel: A cloud-native SIEM with integrated GenAI
by
in SecurityNews
Tags: ai, attack, automation, breach, business, cloud, cyber, cybersecurity, data, data-breach, detection, edr, intelligence, microsoft, risk, siem, skills, soar, soc, technology, threat, tool, training, vulnerabilityIn a recent survey, 74% of cybersecurity professionals said that the threat landscape is the worst they’ve seen in 5 years.1 Escalating cyber threats, an expanding attack surface, and staffing shortages are putting tremendous pressure on the security operations center (SOC).It’s never been more important to have the right tools in place, especially when it…
-
New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers
Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated attack targeting various organizations, unlike typical nation-sponsored attacks. While primarily associated with BeaverTail and InvisibleFerret malware, SOCs have recently observed OtterCookie deployed within this campaign. OtterCookie exhibits distinct behavior from its predecessors, demonstrating the campaign’s evolution and expanding threat landscape, which…
-
Achieving Stability with Enhanced Secret Detection
by
in SecurityNewsIs the Quest for Stability an Uphill Battle in Cybersecurity? In the vast landscape of data management and cybersecurity, professionals constantly grapple with threats that lurk in the shadows, invisible and unpredictable. The elusive nature of these threats often leaves CISOs, SOC teams, and other cybersecurity professionals wondering: how can stability be achieved in a……
-
From reactive to proactive: Redefining incident response with unified, cloud-native XDR
by
in SecurityNewsIn today’s rapidly evolving threat landscape, cybersecurity is a constant game of cat and mouse. The average security operations center (SOC) team receives 4,484 alerts every day and can spend up to 3 hours manually triaging to understand which signals represent a genuine threat and which are just noise.However, this model traps SOCs in a…
-
Fighting on the New Front Line of Security with Snowflake and LogLMs
by
in SecurityNews
Tags: access, ai, attack, cyber, cybersecurity, data, detection, finance, incident response, intelligence, malicious, mitre, monitoring, network, siem, soc, threat, toolTempo”Š”, “Ša Snowflake Native App”Š”, “Šharnesses AI and Log Language Models for Proactive Cybersecurity Cybersecurity attackers are innovating, challenging traditional security measures, and pushing organizations to seek more innovative solutions. Tempo, a Snowflake Native App that revolutionizes cybersecurity using AI-powered proactive security, sees even novel attacks. By leveraging Log Language Models (LogLMs), which are a…