Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Next Level Automation: What's New with Splunk Phantom

Splunk Phantom 4.10 introduced many new enhancements, including the ability to develop playbooks in Python 3. In fact, Python 3 is now the default for Splunk Phantom playbooks. In doing so, we needed to create two different “playbook runners” to ensure we could continue to support playbooks written in Python 2.7 while also supporting Python 3.

Splunk SOAR Playbooks: Finding and Disabling Inactive Users on AWS

Every organization that uses AWS has a set of user accounts that grant access to resources and data. The Identity and Access Management (IAM) service is the part of AWS that keeps track of all the users, groups, roles and policies that provide that access. Because it controls permissions for all other services, IAM is probably the single most important service in AWS to focus on from a security perspective.

Automation Made Easy: What's New with Splunk Phantom

The Splunk Security Team is excited to share some of the new and enhanced capabilities of Splunk Phantom, Splunk’s security orchestration, automation and response (SOAR) technology. Phantom’s latest update (v4.10) makes automation implementation, operation and scaling easier than ever for your security team.

Top 7 Cybersecurity Threats to Watch Out For in 2021

2020 is coming to a close and technology has evolved rapidly to make way for changing market conditions. Cloud computing, Artificial Intelligence (AI), automation, and the Internet of Things (IoT) are evolving technologies that create unparalleled opportunities for companies to unlock new value. When technology advances, so does the landscape of cyber threats that companies have to navigate.

Key Benefits Of A SOAR Solution For MSSPS

An increasing number of organizations have partnered with Managed Security Service Providers due to the large range of threats facing organizations (MSSP). MSSPs support organizations efficiently by not only identifying external risks but also aiding them in the response to incidents. They also, however, battle a major problem: falling victim to the same shortcoming and bigger risks. They must ensure that consumers are met with Service Level Agreements (SLAs).

What is Security Orchestration Automation and Response?

With the face of cyberthreats in a constant state of flux, it’s nearly impossible for IT and Security teams to manually secure their countless systems, applications, services, and devices, as well as respond to potential and active cyberattacks that manage to flourish despite best efforts.

Questions to Ask Before Investing in a SOAR Platform

The state of enterprise cybersecurity is becoming increasingly complex, thanks to the growing number of malicious threats. According to Gartner, a burst of varied security alarms are terrorizing the cyber landscape. However, there are very few efficient people or processes to help organizations deal with them. In 2017, the research company came up with an innovative and powerful approach to address and deter catastrophic cyber threats to enterprises - SOAR!

Combating mega data breaches with SOAR cybersecurity in 2020 | Anlyz

According to a study conducted by IBM, the cost of a data breach has increased 12% over the last 5 years. The estimated cost globally is $3.92 million on average. The predictions are even more concerning for small and medium-sized businesses with employees less than 500. For such companies whose average annual revenue does not cross $50 million, losses of $2.5 million on an average can be potentially crippling.

Case Management - SOAR cybersecurity pitfalls to avoid | Anlyz

Gartner predicts that by the end of 2020, 15% of organizations with a security team of more than five security professionals will leverage SOAR. This is primarily because Security Orchestration Automation and Response has transformed cybersecurity case management at enterprises by addressing alert overload and bringing together disparate security systems seamlessly.

Building incident response plan - SOAR cybersecurity | Anlyz

Cybersecurity breaches are at a record high and the trends indicate that the situation is nowhere close to dying out. The past year has seen a surge of attacks on global business giants narrating their experiences and spelling out that expensive resources and tools are not enough to defend an organization from security threats. (Bold, Italics) So, what is it that businesses need to do to ensure that their security system is immune to attacks?