How SOAR Makes Threat Detection and Remediation More Effective
The only thing spookier than the goblins and ghouls out this Halloween are undetected threats… You know what’s really spooky? It’s not the goblins and ghouls out this Halloween. It’s devices around an organization’s infrastructure that send more alerts than security operations center (SOC) teams can handle, leading to analyst ... Read More
Arming your Security Operations Center with SOAR
Covid-19 has only exacerbated an already challenging threat landscape for today's security operations (SecOps) teams, and bad actors are capitalizing on the chaos. Some related vulnerabilities include increased phishing attacks, questionable domain registration and the need for more VPN monitoring. A security orchestration, automation and response (SOAR) solution optimize a ... Read More
Arming your Security Operations Center with SOAR
Covid-19 has only exacerbated an already challenging threat landscape for today's security operations center (SOC), and bad actors are capitalizing on the chaos. Some related vulnerabilities include increased phishing attacks, questionable domain registration and the need for more VPN monitoring. A security orchestration, automation and response (SOAR) solution optimizes a ... Read More
Automating DFIR with SOAR
A Digital Forensics and Incident Response (DFIR) plan is a systematic and documented method of approaching and managing situations resulting from IT security incidents or breaches as well as collecting evidence related to those incidents or breaches. DFIR plans are used in enterprise IT environments and facilities to identify, respond, ... Read More
Automating DFIR with SOAR
What is DFIR and Why Do I Care? A Digital Forensics and Incident Response (DFIR) plan is a systematic and documented method of approaching and managing situations resulting from IT security incidents or breaches as well as collecting evidence related to those incidents or breaches. DFIR plans are used in ... Read More
How to Maximize Your SOAR Investment
The Problem Today’s security analysts face serious challenges when attempting to identify, assess, respond to and remediate alerts in a timely manner. What's more, as new internet of things (IoT) devices are added to the network and attackers develop new techniques and increased sophistication, the threat landscape continues to grow, ... Read More
How to Maximize Your SOAR Investment
The Problem Today’s security analysts face serious challenges when attempting to identify, assess, respond to and remediate alerts in a timely manner. What's more, as new internet of things (IoT) devices are added to the network and attackers develop new techniques and increased sophistication, the threat landscape continues to grow, ... Read More
Phishing: A humiliating experience
Shortly before I came to work at Swimlane, I was the victim of a phishing scam. Upon reflection, the experience was more embarrassing than anything because I allowed the scam to go further than it should. When I finally figured out it was a phishing scam—and not a support call—was ... Read More

