security operations

Laying the foundation for a proactive SOC
Most companies are trying to shift their Security Operations Center (SOC) from a reactive to a proactive posture. To do that, the analysts’ reaction to security events …

Automating the hunt for cyber attackers
In this podcast recorded at Black Hat USA 2017, Mike Banic, Vice President, Marketing, and Chris Morales, Head of Security Analytics at Vectra Networks, talk about the use of …

Secrets of successful threat hunters and SOCs
McAfee has polled over 700 IT and security professionals from a diverse set of countries, industries, and organization sizes about the role of threat hunting and the evolution …

CrowdStrike launches malware search engine
CrowdStrike launched CrowdStrike Falcon MalQuery, the first malware search and intelligence component of its CrowdStrike Falcon Search Engine for cybersecurity data. …

Creating the security operations center of the future with Siemplify
Security operations teams are engaged in a constant struggle to keep up with the volume of security alerts, maintain the right skills, and manage incident response processes. …

Launch your own cybersecurity sprint: 30 days to improved security
Whether it’s well-publicized cyber attacks on government organizations or widespread ransomware that threatens to halt business operations, attackers continue to target …

Security analytics and operations are becoming more difficult
A new Enterprise Strategy Group (ESG) study, which involved a survey of more than 400 IT and cybersecurity professionals, found that 72 percent feel cybersecurity analytics …

Assess, report and remediate security-related configuration issues
Qualys announced Security Configuration Assessment (SCA), a new add-on for Vulnerability Management (VM) that provides customers cloud-based tools to automate configuration …

Cybersecurity analytics and operations: Need for automation and orchestration
New research from Enterprise Strategy Group (ESG) shows that when it comes to the evolution of Cybersecurity Analytics and Operations, 71% of respondent organizations find it …

Evolution of security operations from reactionary survival mode to forced sophistication
The most security-sensitive companies approach their job and their day with the default assumption that they have been hacked, and they set out to prove that important …

3 sour notes interrupting security operations harmony
Great musicians and instruments alone do not make beautiful music. It is the conductor who leads the orchestra and turns the collection of sounds into perfectly executed …

Will most security operations transition to the cloud?
Companies across industries are increasingly leveraging the cloud for security applications, with 42 percent indicating they currently run security applications in the cloud …
Featured news
Resources
Don't miss
- CTM360 maps out real-time phishing infrastructure targeting corporate banking worldwide
- Malicious RVTools installer found on official site, researcher warns
- AI hallucinations and their risk to cybersecurity operations
- Why EU encryption policy needs technical and civil society input
- Hanko: Open-source authentication and user management