Improving IT Resiliency with Security Automation and Orchestration
The 2018 Winter Olympics offered many exhilarating examples of resiliency in sports—world-class athletes recovering from hair-raising setbacks and turning in star performances despite nearly wiping...
View ArticleUsing Security Automation and Orchestration for SIEM Triage
With increasing cyber threats, more organizations are using a variety of tools to monitor and manage security. Security information and event management (SIEM) systems are popular solutions that...
View ArticleGartner SOAR Report: Innovation Insight for Security Orchestration,...
If you’re even a casual fan of the original Star Trek, you’ll be familiar with Scotty’s signature phrase, “I can’t do it, Captain! I don’t have the power!” Or better, when he uttered the famous line,...
View ArticleSecOps Hub: New Security Operations Community
There’s a shortage of places for security operations (SecOps) professionals to share knowledge around security automation and orchestration. Automation and orchestration within SecOps are still new and...
View ArticleMeet Swimlane at RSA 2018!
Swimlane will be attending RSA 2018 in San Francisco from April 16 to 20th! Stop by our booth to see a demo of the upcoming release of Swimlane 3.0 and to enter our giveaway. Meet us in the North Expo...
View ArticleBuilding an Incident Response Playbook
What is an Incident Response Playbook? A playbook is defined as a set of rules, describing at least one action to be executed with input data and triggered by one or more events. It is a critical...
View ArticleProactive Cyber Threat Hunting Using Security Orchestration, Automation, and...
Organizations can no longer be passive when it comes to security. By the time an active threat is detected, quarantined and terminated it’s often already too late. In order to truly protect and defend...
View ArticleImproving Insider Threat Detection
Detecting and proactively preventing external cyber-attacks is a focus for security operations (SecOps) teams. However, insider attacks also pose a risk. Whether insiders maliciously intend to attack...
View ArticleProven Cyber Threat Hunting Techniques and the Role of SAO
In the constantly-evolving world of cybercrime and cybersecurity, organizations must be proactive. Simply putting up perimeter defenses and watching for attacks is a sure way to have a costly breach....
View ArticleUsing Security Orchestration, Automation and Response (SOAR) for Improved...
Compiling and utilizing cyber threat intelligence data is key for staying ahead of new threats. Analyzing indicators of compromise (IOCs) allows organizations to preemptively up their defenses based on...
View Article