How to investigate alerts in Microsoft Azure with SOAR

How to investigate alerts in Microsoft Azure with SOAR

| | integrations
Alerts or detections come in many forms—some are good and some are not—and security operations center (SOC) analysts are responsible for the initial investigation into these anomalies. What’s more, when it comes to cloud-based resources, we may not have the luxury of logging everything that happens on a host operating ... Read More
How to investigate alerts in Microsoft Azure with SOAR

How to investigate alerts in Microsoft Azure with SOAR

| | integrations
Alerts or detections come in many forms—some are good and some are not—and security operations center (SOC) analysts are responsible for the initial investigation into these anomalies. What’s more, when it comes to cloud-based resources, we may not have the luxury of logging everything that happens on a host operating ... Read More
Investigate alerts in Microsoft Azure

Investigate alerts in Microsoft Azure

| | integrations
Alerts or detections come in many forms—some are good and some are not—and security operations center (SOC) analysts are responsible for the initial investigation into these anomalies. What’s more, when it comes to cloud-based resources, we may not have the luxury of logging everything that happens on a host operating ... Read More

Hey InfoSec, what are you doing to protect your DevOps Team?

| | secops
DevOps, serverless applications and containers are just a few of the latest advancements in a developer's toolbox. For development teams, this means that the time to market (TTM) is faster—especially for Agile teams. So, how and what are security operations teams doing to ensure that security is keeping pace with ... Read More
Understanding APIs: SOAP

Understanding APIs: SOAP

| | secops
In my previous post, I talked about the basics of REST (representable state transfer) APIs (application programming interfaces). If you haven't read it yet, I highly recommend you read that post before continuing. In this post, we will be talking about the basics of simple object access protocol (SOAP) APIs, ... Read More
Understanding APIs: SOAP

Understanding APIs: SOAP

| | secops
In my previous post, I talked about the basics of REST (representable state transfer) APIs (application programming interfaces). If you haven't read it yet, I highly recommend you read that post before continuing. In this post, we will be talking about the basics of simple object access protocol (SOAP) APIs, ... Read More
Swimlane & Cylance PROTECT: Endpoint Threat Response

Swimlane & Cylance PROTECT: Endpoint Threat Response

Swimlane and Blackberry Cylance have partnered to offer a new use case that combines the power of security orchestration, automation and response (SOAR) with Cylance PROTECT’s integrated threat prevention solution. The Proactive Endpoint Threat Response use case utilizes our integration to take a proactive response to detections identified by Cylance ... Read More
Proactive Endpoint Threat Response with Swimlane & Cylance PROTECT

Proactive Endpoint Threat Response with Swimlane & Cylance PROTECT

Swimlane and Blackberry Cylance have partnered to offer a new use case that combines the power of security orchestration, automation and response (SOAR) with Cylance PROTECT’s integrated threat prevention solution. The Proactive Endpoint Threat Response use case utilizes our integration to take a proactive response to detections identified by Cylance ... Read More
Swimlane & Cylance PROTECT: Endpoint Threat Response

Swimlane & Cylance PROTECT: Endpoint Threat Response

| | Cylance, EDR, Use Cases
Swimlane and Blackberry Cylance have partnered to offer a new use case that combines the power of security orchestration, automation and response (SOAR) with Cylance PROTECT’s integrated threat prevention solution. The Proactive Endpoint Threat Response use case utilizes our integration to take a proactive response to detections identified by Cylance ... Read More

Understanding APIs: REST

| | secops
Security orchestration, automation and response (SOAR) platforms rely heavily on APIs (application programming interfaces) to drive orchestration of disparate security tools (products) and invoke desired responses in the form of actions. Besides SOAR products, APIs are commonplace among almost all services, tools, and products used by technical workers. Even though ... Read More