Anton’s Alert Fatigue: The Study

Anton’s Alert Fatigue: The Study

Mention “alert fatigue” to a SOC analyst. They would immediately recognize what you are talking about. Now, take your time machine to 2002. Find a SOC analyst (much fewer of those around, ...
resilience, cyber resilience, checklist,

Strengthen Cyber Resilience: A Checklist for ITOps and SecOps Collaboration

Building cyber resilience so that you can persistently prevent, withstand, and recover from disruptions to your network infrastructure is becoming increasingly important ...
Security Boulevard
Application Layer Security: ADR Brings the Application Layer into Cybersecurity Monitoring and Response | Contrast Security

Application Layer Security: ADR Brings the Application Layer into Cybersecurity Monitoring and Response | Contrast Security

At long last, there’s a spotlight — Application Detection and Response (ADR) — that shines the light into what’s been a blindspot: namely, the application layer.  ...
How CyberWinter Studios Saves the Air Force 400K Hours Monthly

How CyberWinter Studios Empowers Warfighters with Automation

| | Customers, secops
The post How CyberWinter Studios Empowers Warfighters with Automation appeared first on AI-enhanced Security Automation ...
Not a SOC FAQ! This is SOC FMD!

Not a SOC FAQ! This is SOC FMD!

Somebody asked me this profound question that (a) I feel needs an answer and that (b) I’ve never answered in the past:If you run a SOC (or an equivalent D&R team), what things ...
Fernao Magellan Saves 70% of Time with Swimlane Security Automation

How fernao magellan Customized 140 Automation Use Cases

| | Customers, secops
The post How fernao magellan Customized 140 Automation Use Cases appeared first on AI-enhanced Security Automation ...
AHEAD Reduces Alerts by 30% with Swimlane Turbine

How AHEAD Enhanced SecOps Efficiency with Low-code Security Automation

| | Customers, low-code, secops
The post How AHEAD Enhanced SecOps Efficiency with Low-code Security Automation appeared first on AI-enhanced Security Automation ...
Risk and Reward of APIs and Third-Party Connectors in the Cloud

Risk and Reward of APIs and Third-Party Connectors in the Cloud

Risk and Reward of APIs and Third-Party Connectors in the Cloud7 min read·Just now--A Security Operations (#SecOps) and Engineering Commentary from industry insider Rohan Bafna , SecOps Engineer.Third-party connectors through an Application ...
Learn Modern SOC and D&R Practices Using Autonomic Security Operations (ASO) Principles

Learn Modern SOC and D&R Practices Using Autonomic Security Operations (ASO) Principles

Learn Modern SOC and D&R practices for free from Google! Yes, really! That’s the message. Join *hundreds* of others who already signed up!Now, with full details….After some ungodly amount of work, the original ...
cyberattacks, attacks, malware, environment data cyberattacks defend wiper hermeticwiper malware wiper file systems storage Zerologon

Cyberattack Rate Surges as Novel Malware Growth Accelerates

The rate of cyberattacks is rising as the threat level continues to evolve, according to BlackBerry Limited’s latest Global Threat Intelligence Report ...
Security Boulevard