Quantcast
Channel: Blog – Swimlane
Browsing latest articles
Browse All 72 View Live

Image may be NSFW.
Clik here to view.

Improving IT Resiliency with Security Automation and Orchestration

The 2018 Winter Olympics offered many exhilarating examples of resiliency in sports—world-class athletes recovering from hair-raising setbacks and turning in star performances despite nearly wiping...

View Article


Image may be NSFW.
Clik here to view.

Using Security Automation and Orchestration for SIEM Triage

With increasing cyber threats, more organizations are using a variety of tools to monitor and manage security. Security information and event management (SIEM) systems are popular solutions that...

View Article


Image may be NSFW.
Clik here to view.

Gartner SOAR Report: Innovation Insight for Security Orchestration,...

If you’re even a casual fan of the original Star Trek, you’ll be familiar with Scotty’s signature phrase, “I can’t do it, Captain! I don’t have the power!” Or better, when he uttered the famous line,...

View Article

Image may be NSFW.
Clik here to view.

SecOps Hub: New Security Operations Community

There’s a shortage of places for security operations (SecOps) professionals to share knowledge around security automation and orchestration. Automation and orchestration within SecOps are still new and...

View Article

Image may be NSFW.
Clik here to view.

Meet Swimlane at RSA 2018!

Swimlane will be attending RSA 2018 in San Francisco from April 16 to 20th! Stop by our booth to see a demo of the upcoming release of Swimlane 3.0 and to enter our giveaway. Meet us in the North Expo...

View Article


Image may be NSFW.
Clik here to view.

Building an Incident Response Playbook

What is an Incident Response Playbook? A playbook is defined as a set of rules, describing at least one action to be executed with input data and triggered by one or more events. It is a critical...

View Article

Image may be NSFW.
Clik here to view.

Proactive Cyber Threat Hunting Using Security Orchestration, Automation, and...

Organizations can no longer be passive when it comes to security. By the time an active threat is detected, quarantined and terminated it’s often already too late. In order to truly protect and defend...

View Article

Image may be NSFW.
Clik here to view.

Improving Insider Threat Detection

Detecting and proactively preventing external cyber-attacks is a focus for security operations (SecOps) teams. However, insider attacks also pose a risk. Whether insiders maliciously intend to attack...

View Article


Image may be NSFW.
Clik here to view.

Proven Cyber Threat Hunting Techniques and the Role of SAO

In the constantly-evolving world of cybercrime and cybersecurity, organizations must be proactive. Simply putting up perimeter defenses and watching for attacks is a sure way to have a costly breach....

View Article


Image may be NSFW.
Clik here to view.

Using Security Orchestration, Automation and Response (SOAR) for Improved...

Compiling and utilizing cyber threat intelligence data is key for staying ahead of new threats. Analyzing indicators of compromise (IOCs) allows organizations to preemptively up their defenses based on...

View Article
Browsing latest articles
Browse All 72 View Live