Security Consolidation vs. Security Orchestration
The Right Choice Will Make All the Difference A recent survey at the ISACA/RSA conference found that a third of organizations take 6 months or more to fill a cyber security position, and 10% can’t fill...
View ArticleReducing Security Operations MTTD and MTTR
For many security operations (SecOps) teams, the real measure of where the “rubber meets the road” is tied to two metrics—Mean Time to Detect (MTTD) an attack, and the Mean Time to Respond (MTTR), (the...
View ArticleAutomate ThreatGrid Investigation and Response with Out-of-the-Box Swimlane...
Out-of-the-Box Integrations Automate Cisco AMP ThreatGrid Malware Defense Processes A common repetitive task performed in a SOC is to submit suspicious files to a malware sandboxing technology. These...
View ArticleDon’t Be an Asymptote! Understanding the Cost of Delayed Threat Response
Figure1 – Example of an asymptote of a function that approaches infinity on the y-axis. It should be the unwritten rule of cybersecurity: Don’t make an asymptote of yourself or your team members. As...
View ArticleImproving SecOps Communications with Your Board of Directors
Presenting well to the board is critical for security operations. It’s frequently the best opportunity to demonstrate value in quantifiable terms to solidify continued support for the organization’s...
View ArticleAutomated Incident Response: Respond to Every Alert
Cybersecurity management is a challenge. Many organizations lack the resources and staff needed to tackle the growing number of threats to their organization. This inability to handle the volume of...
View ArticleUsing Situational Awareness to Improve Threat Response Effectiveness
Every organization wants to improve its cyber-defenses. But doing so requires continuous adaptation to ensure that the security operations team is equipped to respond to evolving threats. Finding new...
View ArticleSecurity Operations Efficiency: Do More with Your Existing Staff
Assembly line workers at the Ford Motor company apply Frederick Taylor’s “Scientific Management” principles on an auto assembly line. You’re thinking like Frederick Taylor, aren’t you? “Wait a minute,”...
View ArticleCybersecurity Staffing Shortage? SAO Can Help
According to the Identity Theft Center, data breaches increased 40% in 2016 over 2015. So far, it looks like 2017 is going to be even worse. In 2016, there was a 40% increase in data breaches. The best...
View ArticleWEBINAR 5/3: Security Automation and Orchestration
Please join us for a Security Automation and Orchestration Webinar on Wednesday, May 3rd. https://goo.gl/CfwIYY Forrester will be sharing some of their research from the April 2017 Forrester “Breakout...
View ArticleSecurity alert management: Simplified with Automation
Security alert management is a challenge. Large organizations handle between 10,000 and 150,000 security alerts per day and simply don’t have the resources to handle this overwhelming number of...
View ArticleAre Too Many SIEM Alerts Overwhelming Your Staff? Use SAO. | Swimlane
SIEM platforms are a great way to protect your organization from cyberattacks. They promise to monitor and alert your SecOps team of internal and external threats so they can stay ahead of...
View ArticleCybersecurity Staffing Shortage | Maximize MSSP Efficiency with SAO
Whether in whole or in part, IT security operations are increasingly being outsourced. According to Gartner, more than half of surveyed organizations will be outsourcing at least some of their security...
View ArticleWhat is Security Automation and Do You Need It? (Yes!)
With an increasingly complex cyber threat landscape and an extreme shortage of skilled security professionals, many organizations are looking for ways to improve and simplify security operations....
View ArticleOvercoming the Cybersecurity Skills Shortage
The Register’s recent article on the cybersecurity skills shortage certainly offers a catchy title, “Hand in your notice – by 2022 there’ll be 350,000 cybersecurity vacancies.” The vacancy estimate...
View ArticleMeet Us at Black Hat 2017!
The Swimlane team is headed to Mandalay Bay for Black Hat 2017! Come meet us at our booth or join us for drinks and networking at our cocktail reception! Come say hello! We would love to meet you....
View ArticleSecurity Orchestration | What is Security Orchestration?
As the cyber threat landscape continues to evolve, organizations must put new systems and processes in place to combat threats. Over the last few years, security automation and orchestration has become...
View ArticleRealizing an Information Security Risk Management Framework
All organizations face information security risk exposure. Every security manager must confront the reality that there are far more risks than can ever be reasonably managed. So, how does the security...
View ArticleCybersecurity Statistics 2017: A Hard Look at the Facts and Future
Cybersecurity statistics have become a bit more ominous as we review the first half of 2017—and according to industry reports, things aren’t looking up anytime soon. From an alarming increase in brute...
View ArticleThe Need to Integrate Cybersecurity Tools
The best cybersecurity programs blend two basic security concepts: defense in depth and the business impact risk “heat map.” Defense in depth is the practice of building layers of countermeasures to...
View Article