What is SOAR (Security Orchestration, Automation and Response)? Explained by a SecOps Professional

Choosing SOC Tools? Read This First [2024 Guide]

Security operations centers (SOCs) are the front lines in the battle against cyber threats. They use a diverse array of security controls to monitor, detect, and swiftly respond to any cyber menace.These ...
Cato Networks Crowdstrike Qualcomm threat Linux security XDR Kubernetes open source security

Cato Networks Adds XDR Service to SASE Platform

Cato Networks added an XDR service to its SASE platform to simplify centralizing the management of security and networking services ...
Security Boulevard
left-of-bang, threats, vulnerabilities, XDR, zero-trust, attack, XDR API Skyhawk Security modeling threat CosmicStrand insider threats Threat Modeling - Secure Coding - Cybersecurity - Security

Inside the Challenges of XDR Implementation and How to Overcome Them

While XDR tackles the enterprise security challenge of threat detection across a diverse attack surface, it can also create new issues ...
Security Boulevard
EDR vs. XDR: What’s the Difference and Which Is Right for Your Business?

EDR vs. XDR: What’s the Difference and Which Is Right for Your Business?

The cyberthreats we face today are increasingly intricate and multifaceted. Their complexity and stealth have evolved to the point whereRead More The post EDR vs. XDR: What’s the Difference and Which Is ...
What is SOAR (Security Orchestration, Automation and Response)? Explained by a SecOps Professional

XDR vs. SIEM vs. SOAR: A Vendor-Agnostic Perspective

For modern SOC teams, detection and response is a big data problem. Effective cyber defense hinges on collecting, analyzing, and acting on massive troves of security-relevant data. This is where tools like ...
Aligning an Organization’s Attack Surface to Detection Surface is Key to Adversary Defense in Today’s Cloud Era

Aligning an Organization’s Attack Surface to Detection Surface is Key to Adversary Defense in Today’s Cloud Era

With the Cloud Era, the IT asset estate has expanded, and there is a diverse set of attack surfaces to defend. The term "attack surface" describes the growing IT asset estate, but ...
Cato Networks Crowdstrike Qualcomm threat Linux security XDR Kubernetes open source security

CrowdStrike Launches Managed XDR Service

CrowdStrike this week launched a managed extended detection and response (MXDR) service that will secure entire IT environments in addition to endpoints. Tom Etheridge, chief global services officer at CrowdStrike, said the ...
Security Boulevard
Google Kubernetes vulnerabilities

Cymulate Identifies Cyberattack Technique That Evades EDR Platforms

Cymulate, a cybersecurity posture assessment platform provider, shared a technique, dubbed Blindside, that enables malware to evade some endpoint detection and response (EDR) platforms and other monitoring/control systems. Mike DeNapoli, director of ...
Security Boulevard
Securing Critical Infrastructure with XDR

Securing Critical Infrastructure with XDR

In January, CISA, the FBI and the NSA released a joint Cybersecurity Advisory (CSA), titled Understanding and Mitigating Russian State-Sponsored Cyber Threats to U.S. Critical Infrastructure, that provided an overview of Russian ...

Cybersecurity Acronyms: Making Sense of the Alphabet Soup

Trying to decipher Cybersecurity jargon can feel like trying to make sense out of a spoonful of alphabet soup. Is your SIEM equipped with sufficient NTA? What about your XDR? Or wait, ...