Arctic Wolf last week announced plans to buy SOAR platform provider Revelstoke in a move to boost Arctic Wolf's automated response capabilities and lay the groundwork for "deeply embedded" AI and machine learning. CEO Nick Schneider explained how the deal will benefit customers and drive innovation.
Join Cisco experts as they talk about what effective automation looks like, what automation in the world of XDR really means, and why it’s vital for you to start using
The current geopolitical conflicts are generating more and more new malicious code variants as well as new attack tactics and techniques.
To help SOC teams mitigate these threats, in this webinar, the Splunk Threat Research Team traces the entire exploitation sequence, from execution of the latest Remote Access...
SoC teams face many threats and challenges to daily operations. This webinar will be diving into one of the most prominent malware threats - Remote Access Trojans (RATs) that inject destruction code and follow up with exploitive techniques to create a multitude of issues to manage.
Join this webinar and learn more...
Security operations demand massive scale to collect, process, analyze, and act upon massive amounts of data. Early XDR was anchored to two primary data sources: endpoints and networks. While this was an improvement on disconnected EDR and NDR tools, threat detection and response across enterprise organizations demands...
Cybersecurity automation can make a dramatic difference in both team performance and costs. However, calculating tangible ROI on purchases can be difficult. And quantifying ROI is critical to buy-in from leadership. This simple ROI calculator will provide a custom report showing the potential savings your organization...
With employees working remotely and accessing resources and services across public, private, and hybrid clouds through several devices and networks, the attack surface for malicious actors continues to grow.
SOC teams can harden their security posture by combining security and IT operations solutions to defend...
This Expel Quarterly Threat Report (QTR) delivers intelligence you can put into play today on some of the most active attack vectors our SOC leadership team observed in the first quarter of this year. By sharing how attackers got in, and how we stopped them, we’ll translate the security events we detect into...
Alarms, cars, door sensors – alerts around your own home can drive you to frustration. Now just imagine how your SOC team feels with hundreds more alerts daily! That is why effective alert prioritization is vital for any XDR solution, and why Cisco takes a data driven approach, helping SOC teams correlate and...
Zero Trust presents a significant change to traditional enterprise architectures, where a "trust but verify" model sufficed prior to digital transformation initiatives and pervasive cloud adoption. Today, the primary goal of Zero Trust in the SOC is the continued audit and maintenance of a strong security...
One of the biggest challenges facing healthcare providers like Penn State Health is that cyber security threats are always evolving. Threat actors are becoming increasingly sophisticated, continually finding new vulnerabilities and new ways to exploit them.
Download this case study to learn how to:
Keep ahead of the...
Summa Equity bought a majority stake in Logpoint to help the security operations firm expand in areas such as automation, detection and response, and attack surface management. The sustainable growth fund says the acquisition will allow the company to acquire technologies in adjacent areas.
The Essential Guide to Risk Based Alerting is here to empower your SOC like never before.
The Essential Guide to Risk Based Alerting details how RBA, through Splunk Enterprise Security, can reduce the number of overall alerts while increasing the fidelity of alerts that do arise.
This essential guide is here to...
Security Operations Centers (SOCs) are simply overwhelmed: Too much data, too many alerts, and a constantly evolving threat landscape. With AI-driven decision automation, you can level up your ability to perform triage, threat hunting, and incident response — more efficiently, cost-effectively, and...
Amidst the uncertainty of a post-pandemic world, organizations are struggling to keep pace with the challenges posed by remote and hybrid working environments. Today’s analysts spend most of their time performing redundant, menial tasks and SOC leaders continually struggle to hire and retain top talent. This issue...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.