SaaS risk is on the rise: 7 action items for better management

SaaS risk is on the rise: 7 action items for better management

The rapid rise in the use of SaaS applications — often without the IT organization's knowledge or consent — has spawned a whole new set of challenges for security teams. These include ...
Verizon 2025 DBIR: Third-party software risk takes the spotlight

Verizon 2025 DBIR: Third-party software risk takes the spotlight

It’s that time of year again: Verizon Business has released the 2025 edition of the Data Breach Investigations Report (DBIR), its 18th-annual report on cybercrime. The DBIR is famous for how well ...
The cybersecurity job market is complicated: 3 key insights

The cybersecurity job market is complicated: 3 key insights

The state of the cybersecurity job market can seem like a perplexing paradox. On one hand, you’ve got frothy statistics from the likes of ISC2 stating that cybersecurity workforce shortages total 4.8 ...
DtSR Episode 632 - The Politics of Detection Response and Security Ops

The Return of the Baby ASO: Why SOCs Still Suck?

“Flickering screens, a sickly, yellow glow. Humming servers, a constant, low thrum of digital malaise. Alerts screamed into the void, a cacophony of meaningless noise, lost in the echoing expanse of our ...
The Skybox Fallout: A Business Case for Vendor-Resilient Security Operations

The Skybox Fallout: A Business Case for Vendor-Resilient Security Operations

While affected teams face months of disruption, organizations leveraging D3 Morpheus can reap the benefits of its vendor-resilient security architecture. The post The Skybox Fallout: A Business Case for Vendor-Resilient Security Operations ...
Generative AI Cyber Incident Response Tabletop Exercise

A Fair Weather SOC: 5 Signs It’s Time to Panic (and Fix It!)

A fair-weather SOC by Meta AIDo you have a fair-weather friend? Or two?Fair weather friend (via Google)OK, do you also have a fair-weather SOC?This train of thought was inspired by reading pilot forums about how ...
Secure AI deployment is complicated: 5 ways to get your ducks in a row

Secure AI deployment is complicated: 5 ways to get your ducks in a row

| | security operations
The practical and secure implementation of artificial intelligence systems within organizations — starting with the exploration of tools, applications, supply chains, and other components necessary to deploy AI successfully — is the ...
Suspicious file analysis: Enhance your SOC to fight sophisticated attacks

Suspicious file analysis: Enhance your SOC to fight sophisticated attacks

| | security operations
With threat actors constantly ramping up the sophistication and volume of their campaigns, file triage has become essential for modern security operations (SecOps) ...
AI is a double-edged sword: Why you need new controls to manage risk

AI is a double-edged sword: Why you need new controls to manage risk

As with just about every part of business today, cybersecurity has been awash in the promises of what AI can do for its tools and processes. In fact, cybersecurity vendors have touted ...
Securing generative AI: 5 action items to protect your organization

Securing generative AI: 5 action items to protect your organization

Generative AI applications can be a rich source of opportunity for increased productivity and innovation for organizations. At the same time, they are fast becoming a headache for security teams. In a ...