Security Orchestration and Automation
Responding to Cloud Misconfigurations with Security Automation and Common-Sense Tips
Few things can boil the blood of a security professional quite like the unforced error. It is a common term... The post Responding to Cloud Misconfigurations with Security Automation and Common-Sense Tips ...
Selecting the Best SOAR Solution Series: Case (Management) in Point (Part 3)
Welcome to part 3 of our series examining how to select the best security, orchestration, automation and response (SOAR) solution... The post Selecting the Best SOAR Solution Series: Case (Management) in Point ...
How Your SOC Team Can Triumph With Tabletop Exercises [Free Guide]
Among emergency responders, including in the realm of cyber, tabletop exercises are widely accepted as a reliable training activity for... The post How Your SOC Team Can Triumph With Tabletop Exercises [Free ...
How Remote Work is Reshuffling Your Security Priorities and Investments
Roughly five months into the pandemic, stark stories of unsustainability have emerged, from personal debt caused by months-long unemployment to... The post How Remote Work is Reshuffling Your Security Priorities and Investments ...
Selecting the Best SOAR Solution Series: What’s in a Name? (Part 1)
Security orchestration, automation and response, commonly known as SOAR, is one of the most talked about technologies in cybersecurity these... The post Selecting the Best SOAR Solution Series: What’s in a Name? ...
How Automation Can Help You Respond to Hacked Credentials Circulating the Dark Web
Much like the legitimate economy, the cybercriminal marketplace experiences ebbs and flows. Current factors working against it include the ripple... The post How Automation Can Help You Respond to Hacked Credentials Circulating ...
What Is SIEM? What Is SOAR? How Do They Compare? Do You Need Both?
With all the acronyms floating around in cybersecurity, it is easy to get confused by what means what. Security information... The post What Is SIEM? What Is SOAR? How Do They Compare? ...
How to Take Command During a Security Crisis (+Video)
A successful response to a cybersecurity crisis scenario requires having a central integration hub where incidents are managed by security... The post How to Take Command During a Security Crisis (+Video) appeared ...
8 Best Practices for Secure Remote Work Access
As more and more employees have transitioned to working remotely, the cybersecurity threats that their organizations face have changed. While... The post 8 Best Practices for Secure Remote Work Access appeared first ...
How SOAR Can Take Your Security Budget Further in Turbulent Times
When stay-at-home orders came down for much of the world in March, few businesses were spared the consequences of trying... The post How SOAR Can Take Your Security Budget Further in Turbulent ...
