The Skybox Fallout: A Business Case for Vendor-Resilient Security Operations

The Skybox Fallout: A Business Case for Vendor-Resilient Security Operations

While affected teams face months of disruption, organizations leveraging D3 Morpheus can reap the benefits of its vendor-resilient security architecture. The post The Skybox Fallout: A Business Case for Vendor-Resilient Security Operations ...
Morpheus AI render with the caption: "Let Morpheus handle the heavy lifting'

Inside the Morpheus AI-Assisted Workspace: Bridging the Gap Between Complex Data and Rapid Response

Morpheus’s AI-augmented SOC workspace streamlines Jinja transformations, automates Python scripts, and uncovers deep incident insights. The post Inside the Morpheus AI-Assisted Workspace: Bridging the Gap Between Complex Data and Rapid Response appeared ...
The Rise of Vertical Specialization Among MSPs

The Rise of Vertical Specialization Among MSPs

| | Industry, MSP/MSSP
Managed Service Providers (MSPs) are becoming increasingly specializing in specific industries to meet their client’s needs and differentiate themselves in the crowded market. I wanted to take a moment to talk about ...
How Can Offering Threat Modelling as a Service Boost Your MSSP?

From the Creator of PASTA: Tony UcedaVelez’s Expert Guide to Threat Modeling

| | Industry
Strengthen your security strategy with expert guidance from Tony UcedaVelez, the creator of the PASTA Threat Modeling Methodology. The post From the Creator of PASTA: Tony UcedaVelez’s Expert Guide to Threat Modeling ...
Anatomy of a 6-day Credential Stuffing Attack From 2.2M Residential IPs

Anatomy of a 6-day Credential Stuffing Attack From 2.2M Residential IPs

| | Industry
In this article, we cover the details of a heavily distributed credential-stuffing attack that targeted a major US financial service company (spoiler: there were some pretty clear signs of device spoofing, as ...
™

Machine Learning in Cyber Security: Harnessing the Power of Five AI Tribes

Learn about the five key machine learning approaches outlined in the best selling AI book, The Master Algorithm, and their use cases in the field of cybersecurity. The post Machine Learning in ...
A chart from D3 Security's 2024 MSSP Survey for the question - Which is the primary tool your organization uses for automation?

Is SOAR Obsolete?

Let’s look at the factors behind the push to declare the end of SOAR, consider their merits, and determine whether or not SOAR is obsolete. The post Is SOAR Obsolete? appeared first ...
A chart from D3 Security's 2024 MSSP Survey, highlighting services offered by MSSPs. 58% of MSSPs offer MDR services, while 29% offer managed XDR.

MDR vs. MSSP: Making the Right Choice for Your Business

| | Industry, mdr, MSSP, MSSPs
Understand the key differences between MDR and MSSP and choose the right cybersecurity service to protect your business. The post MDR vs. MSSP: Making the Right Choice for Your Business appeared first ...
™

New Research from D3 Ties MSSP Growth, Analyst Wellbeing to Use of Automation

Survey of MSSP professionals finds that providers struggle more with administrative activities than security operations The post New Research from D3 Ties MSSP Growth, Analyst Wellbeing to Use of Automation appeared first ...

Understanding SOC Models: A 5-Minute Guide to Staffing, Technology, and Operations

| | Industry
Security operations centers (SOCs) serve as the central nervous system for an organization’s cybersecurity defenses, tasked with continuously monitoring and analyzing security threats. The architecture of a SOC varies significantly across different ...