security operations

SaaS risk is on the rise: 7 action items for better management
The rapid rise in the use of SaaS applications — often without the IT organization's knowledge or consent — has spawned a whole new set of challenges for security teams. These include ...

Verizon 2025 DBIR: Third-party software risk takes the spotlight
It’s that time of year again: Verizon Business has released the 2025 edition of the Data Breach Investigations Report (DBIR), its 18th-annual report on cybercrime. The DBIR is famous for how well ...

The cybersecurity job market is complicated: 3 key insights
The state of the cybersecurity job market can seem like a perplexing paradox. On one hand, you’ve got frothy statistics from the likes of ISC2 stating that cybersecurity workforce shortages total 4.8 ...

The Return of the Baby ASO: Why SOCs Still Suck?
“Flickering screens, a sickly, yellow glow. Humming servers, a constant, low thrum of digital malaise. Alerts screamed into the void, a cacophony of meaningless noise, lost in the echoing expanse of our ...

The Skybox Fallout: A Business Case for Vendor-Resilient Security Operations
While affected teams face months of disruption, organizations leveraging D3 Morpheus can reap the benefits of its vendor-resilient security architecture. The post The Skybox Fallout: A Business Case for Vendor-Resilient Security Operations ...

A Fair Weather SOC: 5 Signs It’s Time to Panic (and Fix It!)
A fair-weather SOC by Meta AIDo you have a fair-weather friend? Or two?Fair weather friend (via Google)OK, do you also have a fair-weather SOC?This train of thought was inspired by reading pilot forums about how ...

Secure AI deployment is complicated: 5 ways to get your ducks in a row
The practical and secure implementation of artificial intelligence systems within organizations — starting with the exploration of tools, applications, supply chains, and other components necessary to deploy AI successfully — is the ...

Suspicious file analysis: Enhance your SOC to fight sophisticated attacks
With threat actors constantly ramping up the sophistication and volume of their campaigns, file triage has become essential for modern security operations (SecOps) ...

AI is a double-edged sword: Why you need new controls to manage risk
As with just about every part of business today, cybersecurity has been awash in the promises of what AI can do for its tools and processes. In fact, cybersecurity vendors have touted ...

Securing generative AI: 5 action items to protect your organization
Generative AI applications can be a rich source of opportunity for increased productivity and innovation for organizations. At the same time, they are fast becoming a headache for security teams. In a ...