Jay Spann, Author at Security Boulevard
Your First SOAR Use Case: Phishing Triage

Your First SOAR Use Case: Phishing Triage

| | Phishing, use case, Use Cases
Phishing continues to be a dangerously effective attack method. Roughly 91% of successful attacks start with phishing. On average, 30% of the phishing emails sent get opened and viewed. Considering the minuscule cost and effort involved in creating and sending an email, it is no wonder this method continues to ... Read More
Your First SOAR Use Case: Phishing Triage

Your First SOAR Use Case: Phishing Triage

| | Phishing, use case, Use Cases
Phishing continues to be a dangerously effective attack method. Roughly 91% of successful attacks start with phishing. On average, 30% of the phishing emails sent get opened and viewed. Considering the minuscule cost and effort involved in creating and sending an email, it is no wonder this method continues to ... Read More

Reducing Response Times with SOAR-Integrated Threat Intelligence

| | Best Practices
The longer it takes to respond to a security-related event, the more damage that event is likely to cause. Key to reducing such damage—and the amount of dwell time—is being able to quickly determine the level of risk associated with the indicators of compromise (IOCs). One of the fastest ways ... Read More

Reducing Response Times with SOAR-Integrated Threat Intelligence

| | Best Practices
The longer it takes to respond to a security-related event, the more damage that event is likely to cause. Key to reducing such damage—and the amount of dwell time—is being able to quickly determine the level of risk associated with the indicators of compromise (IOCs). One of the fastest ways ... Read More

How SOAR Can Revolutionize Fraud Detection and Investigation

| | security operations
Detecting and investigating internal and external fraud in your organization can prove to be very difficult. Fraud detection generally occurs after the fraudulent action has already taken place, and in the case of financial institutions, after a customer has called and complained their account is missing assets. The scenario leaves ... Read More

How SOAR Can Revolutionize Fraud Detection and Investigation

| | security operations
Detecting and investigating internal and external fraud in your organization can prove to be very difficult. Fraud detection generally occurs after the fraudulent action has already taken place, and in the case of financial institutions, after a customer has called and complained their account is missing assets. The scenario leaves ... Read More

Swimlane Trial Launches with McAfee's MVISION Marketplace Opening

In working with Swimlane the last four or five years, McAfee is no stranger to Swimlane’s SOAR (Security Orchestration, Automation and Response) platform. We are excited to announce that Swimlane has been selected as one of the inaugural offerings in the new McAfee MVISION Marketplace. As a McAfee Security Integration ... Read More

Swimlane Trial Launches with McAfee's MVISION Marketplace Opening

In working with Swimlane the last four or five years, McAfee is no stranger to Swimlane’s SOAR (Security Orchestration, Automation and Response) platform. We are excited to announce that Swimlane has been selected as one of the inaugural offerings in the new McAfee MVISION Marketplace. As a McAfee Security Integration ... Read More
VPN Status Monitoring & Workflow Automation with SOAR

VPN Status Monitoring & Workflow Automation with SOAR

| | Use Cases
With so many users currently working outside the office, it is more important now than ever to monitor your organization’s remote-access and other VPNs. Dedicating one or more staff members to the task of VPN monitoring—using multiple tools in multiple windows and browser tabs—is inefficient and a difficult way to ... Read More
VPN Status Monitoring & Workflow Automation with SOAR

VPN Status Monitoring & Workflow Automation with SOAR

| | Use Cases
With so many users currently working outside the office, it is more important now than ever to monitor your organization’s remote-access and other VPNs. Dedicating one or more staff members to the task of VPN monitoring—using multiple tools in multiple windows and browser tabs—is inefficient and a difficult way to ... Read More