Vulnerability Management and SOAR

Vulnerability Management and SOAR

Integrating Vulnerability Management into your SOAR to shorten investigation time Vulnerability Management has come along way in recent years. Once thought to be a once a month process, modern vulnerability solutions offer ...

Introducing ZeroNorth – Security Orchestration Has a New Direction

As a security practitioner for the better part of the past 20 years, I have first-hand experience on how challenging it… The post Introducing ZeroNorth – Security Orchestration Has a New Direction ...
Why Enterprises Should Consider NOC/SOC integration

Why Enterprises Should Consider NOC/SOC integration

Enterprises Can Gain Significant Efficiencies and Increased Effectiveness through NOC/SOC Integration Approximately 80% of organizations with a security operations center (SOC) also have a network operations center (NOC). While these two groups ...
Most Used Playbooks of 2018 – Incident Response,Alert & Automation

Most Used Playbooks of 2018 – Incident Response,Alert & Automation

The Most Used Playbook Of 2018 series brings you the production playbooks noted by our professional services team as being most utilized and favored by customer SOCsThese playbooks implement best practice workflows ...
Proven cyber threat hunting techniques and the role of SAO

Proven cyber threat hunting techniques and the role of SAO

In the constantly-evolving world of cybercrime and cybersecurity, proactivity is key. Organizations must engage in regular cyber threat hunting techniques and processes to stay ahead of evolving threats. Putting up perimeter defenses ...