Tag: soc
-
Meet the WAF Squad – Impart Security
by
in SecurityNewsIntroduction Web applications and APIs are critical parts of your attack surface, but managing WAFs has never been easy. False positives, rule tuning, risks of production outages, and log analysis – all of this work has made WAF historically difficult to operationalize. Well, that time is over. Meet Impart’s WAF Squad – a five-member squad…
-
Microsoft Sentinel: A cloud-native SIEM with integrated GenAI
by
in SecurityNews
Tags: ai, attack, automation, breach, business, cloud, cyber, cybersecurity, data, data-breach, detection, edr, intelligence, microsoft, risk, siem, skills, soar, soc, technology, threat, tool, training, vulnerabilityIn a recent survey, 74% of cybersecurity professionals said that the threat landscape is the worst they’ve seen in 5 years.1 Escalating cyber threats, an expanding attack surface, and staffing shortages are putting tremendous pressure on the security operations center (SOC).It’s never been more important to have the right tools in place, especially when it…
-
New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers
Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated attack targeting various organizations, unlike typical nation-sponsored attacks. While primarily associated with BeaverTail and InvisibleFerret malware, SOCs have recently observed OtterCookie deployed within this campaign. OtterCookie exhibits distinct behavior from its predecessors, demonstrating the campaign’s evolution and expanding threat landscape, which…
-
Achieving Stability with Enhanced Secret Detection
by
in SecurityNewsIs the Quest for Stability an Uphill Battle in Cybersecurity? In the vast landscape of data management and cybersecurity, professionals constantly grapple with threats that lurk in the shadows, invisible and unpredictable. The elusive nature of these threats often leaves CISOs, SOC teams, and other cybersecurity professionals wondering: how can stability be achieved in a……
-
From reactive to proactive: Redefining incident response with unified, cloud-native XDR
by
in SecurityNewsIn today’s rapidly evolving threat landscape, cybersecurity is a constant game of cat and mouse. The average security operations center (SOC) team receives 4,484 alerts every day and can spend up to 3 hours manually triaging to understand which signals represent a genuine threat and which are just noise.However, this model traps SOCs in a…
-
Fighting on the New Front Line of Security with Snowflake and LogLMs
by
in SecurityNews
Tags: access, ai, attack, cyber, cybersecurity, data, detection, finance, incident response, intelligence, malicious, mitre, monitoring, network, siem, soc, threat, toolTempo”Š”, “Ša Snowflake Native App”Š”, “Šharnesses AI and Log Language Models for Proactive Cybersecurity Cybersecurity attackers are innovating, challenging traditional security measures, and pushing organizations to seek more innovative solutions. Tempo, a Snowflake Native App that revolutionizes cybersecurity using AI-powered proactive security, sees even novel attacks. By leveraging Log Language Models (LogLMs), which are a…
-
4 Ways To Unleash Speed and Efficiency in the SOC
by
in SecurityNewsWith the right tools, your SOC will soon run just like a world-class race car pit crew to deliver on the mission that matters the most: Stopping breaches. First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/4-ways-to-unleash-speed-and-efficiency-in-the-soc/
-
XDR provider Arctic Wolf buys BlackBerry’s Cylance suite
by
in SecurityNews
Tags: ai, business, ceo, ciso, cybersecurity, detection, edr, endpoint, government, infrastructure, office, phone, risk, service, soc, technologyUS provider Arctic Wolf has struck a deal to buy BlackBerry’s Cylance endpoint security suite, which it will integrate into its Aurora extended detection and response (XDR) platform.Arctic Wolf said this morning that if the deal is approved by regulators, the company will be able to offer one of the largest open XDR security platforms…
-
Empower Your SOC Teams with Cloud-Native Security Solutions
by
in SecurityNewsCan Cloud-Native Security Be a Game-Changer for Your SOC Teams? In today’s complex digital landscape, organizations are increasingly challenged to protect their data while ensuring compliance with evolving cybersecurity regulations. From finance to healthcare, businesses are recognizing the need for a more comprehensive approach to securing machine identities, especially Non-Human Identities (NHIs). Could effective NHI……
-
Anton’s Security Blog Quarterly Q4 2024
by
in SecurityNews
Tags: ai, automation, ciso, cloud, cyber, defense, detection, edr, google, governance, incident response, metric, office, security-incident, siem, soc, threat, vulnerability, vulnerability-management, zero-trustAmazingly, Medium has fixed the stats so my blog/podcast quarterly is back to life. As before, this covers both Anton on Security and my posts from Google Cloud blog, and our Cloud Security Podcast (subscribe). Meta AI creation, steampunk theme Top 10 posts with the most lifetime views (excluding paper announcement blogs): Security Correlation Then…
-
Top tips for CISOs running red teams
by
in SecurityNewsRed team is the de facto standard in offensive security testing when you want to know how all security investments, from technological controls to user training to response procedures, work together when subjected to a targeted attack. Unlike penetration testing, which aims to comprehensively assess a system, or purple team, which assesses detection and response…
-
31 of the Top MSSPs Use D3 for SOC Automation: Here’s Why
by
in SecurityNewsWhy do 31 of the top 250 MSSPs choose D3? From seamless onboarding to cutting alert noise by 99%, D3’s automation revolutionizes managed security. See how. First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/31-of-the-top-mssps-use-d3-for-soc-automation-heres-why/
-
Gen AI use cases rising rapidly for cybersecurity, but concerns remain
by
in SecurityNews
Tags: ai, attack, automation, awareness, ceo, ciso, compliance, control, cybersecurity, data, detection, finance, framework, fraud, GDPR, governance, grc, group, guide, Hardware, HIPAA, incident response, intelligence, international, malware, middle-east, monitoring, phishing, privacy, RedTeam, regulation, risk, risk-assessment, risk-management, soc, software, strategy, technology, threat, tool, training, usaGenerative AI is being embedded into security tools at a furious pace as CISOs adopt the technology internally to automate manual processes and improve productivity. But research also suggests this surge in gen AI adoption comes with a fair amount of trepidation among cybersecurity professionals, which CISOs must keep in mind when weaving gen AI…
-
Why SOC Roles Need to Evolve to Attract a New Generation
by
in SecurityNewsThe cybersecurity industry faces a growing crisis in attracting and retaining SOC analysts. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/soc-roles-evolve-attract-new-generation
-
A Framework for Human-AI Partnership in the SOC
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/perspective/a-framework-for-human-ai-partnership-in-the-soc
-
Burnout in SOCs: How AI Can Help Analysts Focus on High-Value Tasks
by
in SecurityNewsSOC analysts, vital to cybersecurity, face burnout due to exhausting workloads, risking their well-being and the effectiveness of organizational defenses. Security Operations Center (SOC) analyst burnout is a very real problem. These are some of the most important cybersecurity professionals out there, and many of them are being worked to exhaustion. Amidst an already overstretched…
-
Alleviating Alert Fatigue with an MSSP
by
in SecurityNewsBy Euan Carswell, SOC Team Lead at Barrier Networks Everyone can relate to the 7AM alarm call. You can be in a deep sleep when suddenly your ears are met with an incessant pinging that won’t stop until you muster the energy to hit snooze. This is a morning ritual for many. The alarm clock…
-
EU enacts new laws to strengthen cybersecurity defenses and coordination
by
in SecurityNews
Tags: ai, compliance, cyber, cybersecurity, data, defense, framework, healthcare, infrastructure, law, network, penetration-testing, privacy, regulation, risk, service, soc, technology, threat, vulnerabilityThe European Union has enacted two new laws to bolster its cybersecurity defenses and coordination mechanisms. The measures, part of the cybersecurity legislative package, include the Cyber Solidarity Act and amendments to the Cybersecurity Act (CSA).These steps aim to improve the EU’s ability to detect, prepare for, and respond to cyber threats while fostering uniformity…
-
Working in critical infrastructure? Boost your effectiveness with these cybersecurity certifications
by
in SecurityNews
Tags: attack, automation, awareness, china, cisa, communications, compliance, control, cyber, cybersecurity, defense, finance, germany, governance, government, healthcare, HIPAA, incident response, infrastructure, international, jobs, network, PCI, privacy, ransomware, resilience, risk, risk-management, russia, sans, service, skills, soc, supply-chain, technology, training, ukraine, update, warfareHybrid warfare between nation-states is imperilling critical infrastructure around the world, both physically and electronically. Since the start of the Ukraine-Russia conflict, hybrid cyber/physical attacks on satellite and communications, energy, transportation, water, and other critical sectors have spread across Europe and beyond.Chinese perpetrators are actively infiltrating telecommunications networks in the US and abroad, according to…
-
IT/OT Security Operations Center Zusammen gegen die Cyberrisiken der Zukunft
by
in SecurityNews
Tags: socVertrauen ist neben der Expertise ein weiterer zentraler Faktor bei der Partnerwahl. Die ISO-Zertifizierung 27001 weist etwa aus, dass ein IT/OT-SOC-B… First seen on infopoint-security.de Jump to article: www.infopoint-security.de/it-ot-security-operations-center-zusammen-gegen-die-cyberrisiken-der-zukunft/a37223/
-
BlueVoyant stellt innovative Cyber Defense Plattform vor
by
in SecurityNewsDas Unternehmen hat kürzlich ein neues Security Operations (SOC) und Customer Experience Center in Leeds, England, eröffnet, das zum bestehenden SOC i… First seen on infopoint-security.de Jump to article: www.infopoint-security.de/bluevoyant-stellt-innovative-cyber-defense-plattform-vor/a37819/
-
indevis baut SOC- und MDR-Sparte erfolgreich aus
by
in SecurityNews2024 konnte indevis die erfolgreichen MDR-Services weiter ausbauen und wurde als ‘Market Challenger in der Kategorie ‘Managed Security Services SOC (M… First seen on infopoint-security.de Jump to article: www.infopoint-security.de/indevis-baut-soc-und-mdr-sparte-erfolgreich-aus/a37982/
-
Telekom verstärkt Cyberabwehr durch Ausbau des SOCs
by
in SecurityNews
Tags: socDas Telekom-SOC in Bonn ist eines der größten seiner Art in Europa und arbeitet mit weiteren Sicherheitszentren in 13 Ländern zusammen, um einen weltw… First seen on infopoint-security.de Jump to article: www.infopoint-security.de/telekom-verstaerkt-cyberabwehr-durch-ausbau-des-socs/a38235/
-
Neue Studie zeigt zunehmendes Misstrauen der SOC-Teams zu ihren Security-Tools
by
in SecurityNews60 % der SOC-Fachleute sagen, dass Sicherheitsanbieter sie mit sinnlosen Warnmeldungen überfluten, um für Sicherheitsverletzungen nicht zur Verantwort… First seen on infopoint-security.de Jump to article: www.infopoint-security.de/neue-studie-zeigt-zunehmendes-misstrauen-der-soc-teams-zu-ihren-security-tools/a38541/
-
Cyberangriffe auf Rekordhoch Ist KI die Rettung für überlastete Sicherheitsteams?
by
in SecurityNewsDie Flut von Alarmen und die Vielzahl von Sicherheitstools erschweren es den SOCs zunehmend, echte Bedrohungen zu erkennen und darauf zu reagieren. Es ist äußerst besorgniserregend, dass 71 Prozent der Befragten befürchten, einen echten Angriff zu übersehen. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/cyberangriffe-auf-rekordhoch-ist-ki-die-rettung-fuer-ueberlastete-sicherheitsteams/a39098/
-
Dynamischere Cyber-Resilienz – Rein ins SOC: Was Speicheradmins wissen müssen
by
in SecurityNewsFirst seen on security-insider.de Jump to article: www.security-insider.de/optimierung-der-speicherinfrastruktur-durch-neues-soc-verstaendnis-a-c08124bb525896e3d740678bde87c3cd/
-
How to Read, Review, and Analyze a SOC 2 Report
by
in SecurityNewsDiscover how to maximize the value of your SOC 2 report to enhance your business’s security posture and strengthen trust. First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/11/how-to-read-review-and-analyze-a-soc-2-report/
-
Top 7 Vanta Alternatives to Consider in 2025
by
in SecurityNewsThe Rise of Compliance-Centric Platforms Vanta was developed to help organizations achieve SOC 2 compliance quickly. Compliance management platforms have gained significant traction in the market. For startups and smaller businesses, these certifications are often crucial for breaking into markets where enterprise clients expect certain compliance standards as baseline requirements. Vanta offers robust integrations that……