security operations
How metrics can enhance the effectiveness of security programs
For anyone responsible for maintaining their organization’s security posture, the findings from the SANS 2018 Security Operations Center (SOC) Survey should come as no …
Why creativity is key to security
Similar to corporate auditors and risk and compliance managers, security teams are often viewed as a hindrance to business growth. They are deemed the killjoys of business …
Bring order to the chaos of incident response and threat investigations
In this podcast recorded at RSA Conference 2018, Leon Ward, VP of Product Management at ThreatQuotient, talks about bringing order to the chaos of security operations, as well …
SOCs require automation to avoid analyst fatigue for emerging threats
A survey conducted by LogicHub at RSA Conference 2018 identified 79 percent of respondents believe both human expertise and security automation is needed for a powerful …
Would automation lead to improved cybersecurity?
Concerted efforts to increase job satisfaction, automation in the Security Operations Center (SOC) and gamification in the workplace are key to beating cybercriminals at their …
Excessive alerts, outdated metrics, lead to over-taxed security operations centers
A new study, conducted by 360Velocity and Dr. Chenxi Wang, found that excessive alerts, outdated metrics, and limited integration lead to over-taxed security operations …
Global SOC maturity improves, yet some still operate with serious gaps in security
Despite the volume of threats rising, the global findings of a new Micro Focus report indicate that more mature Security Operational Centres (SOCs) are becoming more efficient …
Continuous security: What’s in a name?
DevOps has changed the lives of programmers everywhere for the better. Giving engineering teams operational responsibility drives more robust offerings and better automation. …
Laying the foundation for a proactive SOC
Most companies are trying to shift their Security Operations Center (SOC) from a reactive to a proactive posture. To do that, the analysts’ reaction to security events …
Automating the hunt for cyber attackers
In this podcast recorded at Black Hat USA 2017, Mike Banic, Vice President, Marketing, and Chris Morales, Head of Security Analytics at Vectra Networks, talk about the use of …
Secrets of successful threat hunters and SOCs
McAfee has polled over 700 IT and security professionals from a diverse set of countries, industries, and organization sizes about the role of threat hunting and the evolution …
CrowdStrike launches malware search engine
CrowdStrike launched CrowdStrike Falcon MalQuery, the first malware search and intelligence component of its CrowdStrike Falcon Search Engine for cybersecurity data. …
Featured news
Sponsored
Don't miss
- Applying DevSecOps principles to machine learning workloads
- Overcoming GenAI challenges in healthcare cybersecurity
- 25 cybersecurity AI stats you should know
- Hackers backdoored Cisco ASA devices via two zero-days (CVE-2024-20353, CVE-2024-20359)
- PoC for critical Progress Flowmon vulnerability released (CVE-2024-2389)