SOAR

Palo Alto Networks XSOAR Integration: Maximizing Automation for Incident Detection and Remediation

Automation is becoming more and more prevalent and sought after by Security Operations Centers (SOC). This is driven by the…

2 days ago

Siemplify Joins MVISION Marketplace as an Inaugural Member and Preferred SOAR Partner: What This Means for You

From grabbing the latest social media app to landing a vacation rental, the trend of online marketplaces is rapidly...…

3 weeks ago

3 Steps to Building a Resilient Incident Response Plan

According to the Accenture State of Cybersecurity 2020 report, the average cost of a cyber attack for ‘non-leaders’ stands at…

1 month ago

Five worthy reads: Preparing an incident response plan for the pandemic and beyond

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. With…

1 month ago

Mission Accepted: Respond Software Joins Splunk in Quest to Deliver the Modern SOC

Security analysts utilize a number of tools to do their job properly, but often waste too much time and energy…

1 month ago

Splunk Phantom Integration: Maximizing Automation for Incident Detection and Remediation

Automation is becoming more and more prevalent and sought after by Security Operations Centers (SOC).  This is driven by the…

2 months ago

How to Measure Effectiveness of Your Security Operations with SOAR and Business Intelligence (+Video)

Rising above the daily firefighting to actually measure the effectiveness of your security operations is easier said than done. This,...…

2 months ago

Maximize SOAR investment returns with contextualized threat intelligence

Automation creates efficiency. Reducing the need for humans to complete repetitive tasks has been fundamental to the evolution of technology…

3 months ago

ServiceNow Security Operations Integration: Maximizing Automation for Incident Detection and Remediation

Automation is becoming more and more prevalent and sought after by Security Operations Centers (SOC).  This is driven by the…

3 months ago

Strategies for Insider Threat Mitigation

In Part II of this blog series, we examine strategies for insider threat risk mitigation including key tenants of data…

3 months ago