secops
Anton’s Alert Fatigue: The Study
Mention “alert fatigue” to a SOC analyst. They would immediately recognize what you are talking about. Now, take your time machine to 2002. Find a SOC analyst (much fewer of those around, ...
Strengthen Cyber Resilience: A Checklist for ITOps and SecOps Collaboration
Building cyber resilience so that you can persistently prevent, withstand, and recover from disruptions to your network infrastructure is becoming increasingly important ...
Application Layer Security: ADR Brings the Application Layer into Cybersecurity Monitoring and Response | Contrast Security
At long last, there’s a spotlight — Application Detection and Response (ADR) — that shines the light into what’s been a blindspot: namely, the application layer. ...
How CyberWinter Studios Empowers Warfighters with Automation
The post How CyberWinter Studios Empowers Warfighters with Automation appeared first on AI-enhanced Security Automation ...
Not a SOC FAQ! This is SOC FMD!
Somebody asked me this profound question that (a) I feel needs an answer and that (b) I’ve never answered in the past:If you run a SOC (or an equivalent D&R team), what things ...
How fernao magellan Customized 140 Automation Use Cases
The post How fernao magellan Customized 140 Automation Use Cases appeared first on AI-enhanced Security Automation ...
How AHEAD Enhanced SecOps Efficiency with Low-code Security Automation
The post How AHEAD Enhanced SecOps Efficiency with Low-code Security Automation appeared first on AI-enhanced Security Automation ...
Risk and Reward of APIs and Third-Party Connectors in the Cloud
Risk and Reward of APIs and Third-Party Connectors in the Cloud7 min read·Just now--A Security Operations (#SecOps) and Engineering Commentary from industry insider Rohan Bafna , SecOps Engineer.Third-party connectors through an Application ...
Learn Modern SOC and D&R Practices Using Autonomic Security Operations (ASO) Principles
Learn Modern SOC and D&R practices for free from Google! Yes, really! That’s the message. Join *hundreds* of others who already signed up!Now, with full details….After some ungodly amount of work, the original ...
Cyberattack Rate Surges as Novel Malware Growth Accelerates
The rate of cyberattacks is rising as the threat level continues to evolve, according to BlackBerry Limited’s latest Global Threat Intelligence Report ...