Pending tasks for an incident in Smart SOAR

What Enterprise Security Teams Expect from Case Management Solutions

A less-talked about challenge in cybersecurity is managing multiple alert queues. While the volume of alerts is acknowledged as an issue, an important step toward simplifying day-to-day life for security analysts is ...
Example of a volume analysis showing how many times certain techniques are mentioned in a threat report

Threat Hunting Framework: Three Steps to Translate Threat Reports into Actionable Steps

Thanks to Sally Vincent and Dan Kaiser from the LogRhythm Labs team for developing the process and guiding content described in this post. Threat research can be an invaluable asset to security ...

Swimlane Trial Launches with McAfee's MVISION Marketplace Opening

In working with Swimlane the last four or five years, McAfee is no stranger to Swimlane’s SOAR (Security Orchestration, Automation and Response) platform. We are excited to announce that Swimlane has been ...

Swimlane Trial Launches with McAfee's MVISION Marketplace Opening

In working with Swimlane the last four or five years, McAfee is no stranger to Swimlane’s SOAR (Security Orchestration, Automation and Response) platform. We are excited to announce that Swimlane has been ...

Automated security operations for managed security service providers (MSSP)

While the security automation conversation generally focuses on enterprise and government Security Operations Centers (SOC), one of the largest groups that can benefit from automation are managed security service providers (MSSP). MSSPs ...

Automated security operations for managed security service providers (MSSP)

While the security automation conversation generally focuses on enterprise and government Security Operations Centers (SOC), one of the largest groups that can benefit from automation are managed security service providers (MSSP). MSSPs ...

How to get more out of existing cybersecurity tools instead of replacing them

Considering that government agencies maintaining extremely sensitive information have experienced data breaches recently, it is certainly understandable that enterprises would now be conducting audits of their existing cybersecurity tools—and considering replacing many ...

How to get more out of existing cybersecurity tools instead of replacing them

Considering that government agencies maintaining extremely sensitive information have experienced data breaches recently, it is certainly understandable that enterprises would now be conducting audits of their existing cybersecurity tools—and considering replacing many ...

Seven startling stats on the cybersecurity skills shortage

As security operations centers (SOCs) deal with an increasing volume of alerts and successful breaches, efficient cyber security case management becomes increasingly critical. But the old strategy of simply adding staffers to ...

Seven startling stats on the cybersecurity skills shortage

As security operations centers (SOCs) deal with an increasing volume of alerts and successful breaches, efficient cyber security case management becomes increasingly critical. But the old strategy of simply adding staffers to ...