Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

5 reasons why security automation won't replace skilled security professionals

The cybersecurity landscape is constantly evolving, even more so in the past decade, with technological revolutions changing the core of the cybersecurity industry. With new emerging technologies, machine learning, security automation, and AI are slowly but surely becoming a reality in the cybersecurity world. But as the cybersecurity landscape continues and redefines the roles of security workers, which logically begs the question - what does this mean for security professionals?

Uncovering the powers of Cloud SOAR's Open Integration Framework

The speed at which security operations are processed and data is consumed is moving at a dazzling pace. This is why flexibility, customizability, and user-friendliness are deemed as core pillars of next-gen security solutions. And it is exactly what Cloud SOAR’s Open Integration Framework is all about.

Integrating MITRE ATT&CK with Cloud SOAR to optimize SecOps and Incident Response

Today’s complex cyber threats leave no room for mediocrity. Security analysts must know who is attacking them, how the attacker gained access, what methods they used to infiltrate your systems, and what their next move might be. However, modern cyber threats leave no recognizable patterns in their behavior, making threat anticipation harder than ever. To boost their threat hunting capabilities, SOC teams must implement advanced technologies and strategic techniques.

How to improve MTTD and MTTR with SOAR

In today’s fast-paced cyber threat landscape, it is not a question of IF but WHEN an organization is going to get breached. And in order to prepare in a preemptive manner, organizations should strive to minimize their attackers’ dwell time as much as possible. This is why metrics such as MTTR (Mean time to respond) and MTTD (Mean time to detect) have grown to be highly relevant in the cybersecurity industry.

Strengthen your cloud security posture with Azure Sentinel

Scalable, cloud-native solutions like Azure Sentinel help security teams streamline security operations in cloud environments. In this first of a two-part blog series, we explore the challenges businesses face when detecting and responding to cyber threats and attacks, and how these challenges can be addressed by leveraging Microsoft Azure Sentinel.

How to Implement Cybersecurity Automation in SecOps With SOAR (7 Simple Steps)

When it comes to cybersecurity automation, there is the persistent fear that security automation is here to replace humans. And while those fears are somewhat justified, the reality is that automation in security operations is meant to aid, not hinder security professionals. And with cyber threats evolving at a dazzling rate, cybersecurity automation is slowly becoming a necessity, rather than a luxury.

How to use Cloud SOAR's search query bar to optimize workflow processes

At Sumo Logic, we always pride ourselves on our dedication to make Cloud SOAR as user-friendly as possible. Now, we’re going to show you in practice how we make that happen. Cloud SOAR’s Incident Search Query Bar is easily configurable and allows users to customize their viewing perspective and choose which data they want to see.

Why proactive threat hunting will be a necessity in 2021

We all witnessed how merciless 2020 was for a wide range of organizations. Even the mightiest, most prestigious companies and enterprises are not exempt from the deadly grasp of sophisticated cyber attacks. What this means for security professionals is that they should take a proactive, rather than a reactive stance. But how do you anticipate the unknown? Many security professionals would wonder.

Ransomware attacks 2.0: How to protect your data with SOAR

The COVID-19 crisis prompted a spike in ransomware attacks, which was expected, to say at least. In fact, Checkpoint research shows that in Q3 2020, there was a 50% increase in ransomware attacks compared to earlier periods of this year. And while this wave of ransomware attacks was anticipated, not all organizations were reinforced enough to repel these attacks with proper resources and technologies.