Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

May 2021

Why Midsized SecOps Teams Should Consider Security Log Analytics Instead of Security and Information Event Management

If Ben Franklin lived today, he would add cyber threats to his shortlist of life’s certainties. For decades, bad guys have inflicted malware, theft, espionage, and other forms of digital pain on citizens of the modern world. They seek money, celebrity, and political secrets, and often get them. In 2020, hackers halted trading on the New Zealand stock exchange with a distributed denial of service (DDoS) attack.

Arctic Wolf Managed Security Awareness

Organizations spend a lot of effort enhancing their cybersecurity, building defenses that cyberthreats can’t penetrate. Yet despite all the preparation, many attackers sidestep them all together, through social engineering and targeting busy employees, who if left unprepared, can be tricked into opening a side-door, bypassing the defences your IT team has constructed. Frustrating responders as the volume of attacks increase.

Threat Intelligence, Integration and Automation in a Modern SOC

As organizations continue to evolve their security operations maturity and the SOC increasingly focuses on detection and response, three capabilities are foundational for success – threat intelligence, integration and automation. In a recent webinar, “Evolution of CTI – Use Case in a Modern SOC,” ThreatQuotient’s Yann Le Borgne, together with Ben van Ditmars of Atos and Martin Ohl from McAfee tackle this topic.

Elastic and Swimlane partner to deliver an extensible framework for the modern SOC

Today I’m happy to share more about our partnership with Swimlane, which further reinforces our commitment to empowering security teams everywhere. Today’s security teams rely on the power of Elastic’s high-speed, cloud-scale analytics to solve their most complex and pressing security issues. Swimlane’s security automation platform provides a way for these same teams to accelerate and optimize their workflows for max efficiency and to solve SOAR use cases.

Arctic Wolf Managed Detection and Response

The cybersecurity landscape constantly becomes more difficult to defend as devices proliferate and cyberthreats become more sophisticated. Organizations often rely on new tools to stay protected, but this approach can quickly spiral into a maze of complex products—a patchwork of controls that lack the holistic integrity for effective cybersecurity. Your search for the right solution shouldn't be this hard.

Simplify Automation and Orchestration with a Data-driven Approach to SOAR and XDR

On the heels of announcing the closing of $22.5 million in new financing as a result of strong performance in 2020, I’m proud of our team’s latest innovation that we’re announcing today, ThreatQ TDR Orchestrator is a new data-driven approach to SOAR and XDR that accelerates threat detection and response across disparate systems for more efficient and effective security operations.