Understanding APIs: REST

| | security operations
Security orchestration, automation and response (SOAR) platforms rely heavily on APIs (application programming interfaces) to drive orchestration of disparate security tools (products) and invoke desired responses in the form of actions. Besides ...

Infographic: The Anatomy of Security Operations Pro

A unique genetic makeup is required to be a security operations professional. Analysts, engineers, managers act as the primary digital... The post Infographic: The Anatomy of Security Operations Pro appeared first on ...

Introducing the No-Nonsense Guide to Security Operations Metrics

Few places inside the business demand metrics quite like the security operations center (SOC). Think about it: Not only has... The post Introducing the No-Nonsense Guide to Security Operations Metrics appeared first ...

Uncovering Hidden Threats with Endgame and the Siemplify Security Operations Platform

In a perfect world, security operations center (SOC) teams would always be one or two steps ahead of attackers,... The post Uncovering Hidden Threats with Endgame and the Siemplify Security Operations Platform ...

3 SOAR solution pitfalls to avoid when implementing

At this point, you’ve decided that your security operations center (SOC) is ready for a security orchestration, automation and response (SOAR) solution. You’ve evaluated different SOAR solutions and selected the platform that ...

Product Update: What’s New in Version 5.1 of the Siemplify Security Operations Platform

Security professionals are constantly inundated with information about “breakthrough” products claiming to “change the face” of <insert product category... The post Product Update: What’s New in Version 5.1 of the Siemplify Security ...

Three reasons your SIEM should be paired with SOAR to optimize your security operations

| | security operations
In an ever-expanding threat landscape, digital security breaches can result in costly downtime, lost revenue, regulatory fines and brand damage. According to a recent IBM Security and Ponemon study, the average cost ...

Optimize SecOps by pairing SIEM with SOAR

| | security operations
In an ever-expanding threat landscape, digital security breaches can result in costly downtime, lost revenue, regulatory fines and brand damage. According to a recent IBM Security and Ponemon study, the average cost ...

Every security team is a software team now: Why you should attend the Black Hat keynote

Building and facilitating a culture with continuous collaboration between engineers and security forces is becoming the new philosophy in security, which is why I am stoked for this year's Black Hat USA ...
Loading...