SOAR Use Case | Automated Malware Analysis Use Case Video

Automated Malware Analysis with Low-Code Security Automation

| | SOAR
The post Automated Malware Analysis with Low-Code Security Automation appeared first on Low-Code Security Automation & SOAR Platform | Swimlane ... Read More
Swimlane ChatBot for Slack

11 time saving tricks to try with Swimlane ChatBot for Slack

| | integrations, Use Cases
As a company, we quite literally run on Slack. It has become a staple of our remote culture here at Swimlane, and it’s a critical technology for our daily business operations. That said, it should come as no surprise that I am mildly addicted to Slack. This little obsession inspired ... Read More
Swimlane ChatBot for Slack

11 time saving tricks to try with Swimlane ChatBot for Slack

| | integrations, Use Cases
As a company, we quite literally run on Slack. It has become a staple of our remote culture here at Swimlane, and it’s a critical technology for our daily business operations. That said, it should come as no surprise that I am mildly addicted to Slack. This little obsession inspired ... Read More
Atomic Red Team Testing With Swimlane

Atomic Red Team Testing With Swimlane

| | Best Practices, integrations
Today, Swimlane is excited to announce that we are releasing a new SSP (Swimlane Solutions Package) for use within the Swimlane platform. This SSP will enable organizations to automate the testing of their defenses using Atomic Red Team using our new open-source project called atomic-operator. When using this SSP organizations ... Read More
Atomic Red Team Testing With Swimlane

Atomic Red Team Testing With Swimlane

| | Best Practices, integrations
Today, Swimlane is excited to announce that we are releasing a new SSP (Swimlane Solutions Package) for use within the Swimlane platform. This SSP will enable organizations to automate the testing of their defenses using Atomic Red Team using our new open-source project called atomic-operator. When using this SSP organizations ... Read More
Common REST API Authentication Methods Explained

Common REST API Authentication Methods Explained

| | Use Cases
When it comes to implementing automation and orchestration, it is critical to understand how authentication works with APIs. The majority of the products in your environment likely have some sort of authentication mechanism. You need to know the nuances and differences between various authentication methods in order to automate communications ... Read More
Common REST API Authentication Methods Explained

Common REST API Authentication Methods Explained

| | Use Cases
When it comes to implementing automation and orchestration, it is critical to understand how authentication works with APIs. The majority of the products in your environment likely have some sort of authentication mechanism. You need to know the nuances and differences between various authentication methods in order to automate communications ... Read More

Swimlane Releases elk-tls-docker to Simplify the Testing and Deployment of Elastic Stack

| | security operations
At Swimlane, we love to automate but we also love building and sharing open-source software (OSS) to help security teams. We are proud to announce that we have released a new open-source project called elk-tls-docker to make it easier for you to test and deploy Elastic Stack by automating the ... Read More

Swimlane Releases elk-tls-docker to Simplify the Testing and Deployment of Elastic Stack

| | security operations
At Swimlane, we love to automate but we also love building and sharing open-source software (OSS) to help security teams. We are proud to announce that we have released a new open-source project called elk-tls-docker to make it easier for you to test and deploy Elastic Stack by automating the ... Read More
Automating ATT&CK Testing with SOAR and Atomic Red Team

Automating ATT&CK Testing with SOAR and Atomic Red Team

| | Use Cases
MITRE ATT&CK is the defacto framework for organizations to measure their defense posture. ATT&CK provides categorical verticals in the form of tactics, which align to the common methodologies attackers use. Within these verticals are a set (and subsets) of common ways in which attackers accomplish a tactic (vertical). These are ... Read More