Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Sumo Logic

Mind your Single Sign-On (SSO) logs

The news that hacking group Lapsus$ gained unauthorized access to Single Sign-On (SSO) provider Okta through a third-party support account sent chills through information security professionals everywhere. Organizations have adopted SSO identity providers to enable a modern workforce that is increasingly reliant on secure access to cloud-hosted applications to perform critical business functions.

Want to improve collaboration and reduce incident response time? Try Cloud SOAR War Room

In the last twenty years, more technology has been produced since the beginning of human history. And while we have talked about industrial automation since 1952, the complexity of today’s cybersecurity analyst activities makes the need to embrace automation paramount.

Overwhelmed: why SOAR solutions are a game changer

Cybersecurity presents an ever-escalating challenge for most C-level executives. As the average cost of a data breach continues to grow, the sheer volume of attacks threatens to overwhelm resource-strapped IT organizations. In response, many executives are looking to AI-enabled SOAR solutions (Security Orchestration Automation and Response) to help shorten threat response times, optimize high-value security personnel, and reduce overall business risk.

Cloud-native SOAR and SIEM solutions pave the road to the modern SOC

The ever-evolving cyber threat landscape gives birth to new, unprecedented cyberattacks that challenge traditional cybersecurity approaches and force security operations centers (SOCs) to evolve and redefine their methods. To ensure that the integrity of their data is well-protected, SOCs have to be one step ahead of malicious actors. Ergo, the necessity of creating the modern SOC comes into play.

Adopt user analytics to accelerate security investigations

Machine data analytics is the process of parsing data generated by software from a wide variety of sources including servers, networks, applications and financial records. These, and many other similar sources, produce massive amounts of data including from local operating systems, identity/access management tools, cloud consoles and their associated log files, alerts, scripts and profiles.