The Most Common SOAR Use Cases

Security orchestration, automation and response (SOAR) technology has grown in popularity in the security operations industry, and for good reason. SOAR platforms are designed to help SOC teams automatically execute repetitive tasks, such as responding to phishing alerts, SIEM, or EDR alert triage. That means less time performing manual tasks ... Read More

The Most Common SOAR Use Cases

Security orchestration, automation and response (SOAR) technology has grown in popularity in the security operations industry, and for good reason. SOAR platforms are designed to help SOC teams automatically execute repetitive tasks, such as responding to phishing alerts, SIEM, or EDR alert triage. That means less time performing manual tasks ... Read More
Building Best-of-Both-Worlds Automation and Threat Intel With Swimlane and VirusTotal - Part Two

Building Best-of-Both-Worlds Automation and Threat Intel With Swimlane and VirusTotal – Part Two

|
In part one of this blog series, we introduced the new technology integration between Swimlane and VirusTotal. This is an exciting development that empowers analysts to drill down into the latest, most actionable intelligence and allows us to automate initial classification and triage from a single API call. This time, ... Read More
Building Best-of-Both-Worlds Automation and Threat Intel With Swimlane and VirusTotal - Part Two

Building Best-of-Both-Worlds Automation and Threat Intel With Swimlane and VirusTotal – Part Two

|
In part one of this blog series, we introduced the new technology integration between Swimlane and VirusTotal. This is an exciting development that empowers analysts to drill down into the latest, most actionable intelligence and allows us to automate initial classification and triage from a single API call. This time, ... Read More
Building Best-of-Both-Worlds Automation and Threat Intel With Swimlane and VirusTotal - Part One

Building Best-of-Both-Worlds Automation and Threat Intel With Swimlane and VirusTotal – Part One

With extensive out-of-the-box integrations and an API-first architecture, Swimlane enables simple interoperability with any organization’s existing security stack. Integrations for new and custom applications can also be easily developed using common scripting languages and a RESTful API. The new partnership between Swimlane and VirusTotal is a great example of this ... Read More
Building Best-of-Both-Worlds Automation and Threat Intel With Swimlane and VirusTotal - Part One

Building Best-of-Both-Worlds Automation and Threat Intel With Swimlane and VirusTotal – Part One

With extensive out-of-the-box integrations and an API-first architecture, Swimlane enables simple interoperability with any organization’s existing security stack. Integrations for new and custom applications can also be easily developed using common scripting languages and a RESTful API. The new partnership between Swimlane and VirusTotal is a great example of this ... Read More

Achieving Public-Private Coordination and Collaboration on a National Scale

| | security operations
I recently commented on two ways I believe the cybersecurity community can measure the new administration’s success in cybersecurity. Getting more talent into the workforce and closing the skills gap is something I will champion until the end of time! But I also recognize there are other goals and challenges ... Read More

Achieving Public-Private Coordination and Collaboration on a National Scale

| | security operations
I recently commented on two ways I believe the cybersecurity community can measure the new administration’s success in cybersecurity. Getting more talent into the workforce and closing the skills gap is something I will champion until the end of time! But I also recognize there are other goals and challenges ... Read More

How Do We Measure The New Administration’s Success in Cybersecurity?

| | News and Events
I have grown increasingly passionate about the effects of elections on cybersecurity, and like many administrations before them, it is no secret this administration will face serious cybersecurity challenges. Something I have been thinking about since Inauguration Day is what actually constitutes “success” in regard to cybersecurity at the government ... Read More

How Do We Measure The New Administration’s Success in Cybersecurity?

| | News and Events
I have grown increasingly passionate about the effects of elections on cybersecurity, and like many administrations before them, it is no secret this administration will face serious cybersecurity challenges. Something I have been thinking about since Inauguration Day is what actually constitutes “success” in regard to cybersecurity at the government ... Read More
Loading...

Secure Coding Practices