Quantcast
Channel: Blog – Swimlane
Browsing all 72 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Security Consolidation vs. Security Orchestration

The Right Choice Will Make All the Difference A recent survey at the ISACA/RSA conference found that a third of organizations take 6 months or more to fill a cyber security position, and 10% can’t fill...

View Article


Image may be NSFW.
Clik here to view.

Reducing Security Operations MTTD and MTTR

For many security operations (SecOps) teams, the real measure of where the “rubber meets the road” is tied to two metrics—Mean Time to Detect (MTTD) an attack, and the Mean Time to Respond (MTTR), (the...

View Article


Image may be NSFW.
Clik here to view.

Automate ThreatGrid Investigation and Response with Out-of-the-Box Swimlane...

Out-of-the-Box Integrations Automate Cisco AMP ThreatGrid Malware Defense Processes A common repetitive task performed in a SOC is to submit suspicious files to a malware sandboxing technology.  These...

View Article

Image may be NSFW.
Clik here to view.

Don’t Be an Asymptote! Understanding the Cost of Delayed Threat Response

Figure1 – Example of an asymptote of a function that approaches infinity on the y-axis. It should be the unwritten rule of cybersecurity: Don’t make an asymptote of yourself or your team members. As...

View Article

Image may be NSFW.
Clik here to view.

Improving SecOps Communications with Your Board of Directors

Presenting well to the board is critical for security operations.  It’s frequently the best opportunity to demonstrate value in quantifiable terms to solidify continued support for the organization’s...

View Article


Image may be NSFW.
Clik here to view.

Automated Incident Response: Respond to Every Alert

Cybersecurity management is a challenge. Many organizations lack the resources and staff needed to tackle the growing number of threats to their organization. This inability to handle the volume of...

View Article

Image may be NSFW.
Clik here to view.

Using Situational Awareness to Improve Threat Response Effectiveness

Every organization wants to improve its cyber-defenses. But doing so requires continuous adaptation to ensure that the security operations team is equipped to respond to evolving threats. Finding new...

View Article

Image may be NSFW.
Clik here to view.

Security Operations Efficiency: Do More with Your Existing Staff

Assembly line workers at the Ford Motor company apply Frederick Taylor’s “Scientific Management” principles on an auto assembly line. You’re thinking like Frederick Taylor, aren’t you? “Wait a minute,”...

View Article


Image may be NSFW.
Clik here to view.

Cybersecurity Staffing Shortage? SAO Can Help

According to the Identity Theft Center, data breaches increased 40% in 2016 over 2015. So far, it looks like 2017 is going to be even worse. In 2016, there was a 40% increase in data breaches. The best...

View Article


Image may be NSFW.
Clik here to view.

WEBINAR 5/3: Security Automation and Orchestration

Please join us for a Security Automation and Orchestration Webinar on Wednesday, May 3rd. https://goo.gl/CfwIYY Forrester will be sharing some of their research from the April 2017 Forrester “Breakout...

View Article

Image may be NSFW.
Clik here to view.

Security alert management: Simplified with Automation

Security alert management is a challenge. Large organizations handle between 10,000 and 150,000 security alerts per day and simply don’t have the resources to handle this overwhelming number of...

View Article

Image may be NSFW.
Clik here to view.

Are Too Many SIEM Alerts Overwhelming Your Staff? Use SAO. | Swimlane

SIEM platforms are a great way to protect your organization from cyberattacks. They promise to monitor and alert your SecOps team of internal and external threats so they can stay ahead of...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity Staffing Shortage | Maximize MSSP Efficiency with SAO

Whether in whole or in part, IT security operations are increasingly being outsourced. According to Gartner, more than half of surveyed organizations will be outsourcing at least some of their security...

View Article


Image may be NSFW.
Clik here to view.

What is Security Automation and Do You Need It? (Yes!)

With an increasingly complex cyber threat landscape and an extreme shortage of skilled security professionals, many organizations are looking for ways to improve and simplify security operations....

View Article

Image may be NSFW.
Clik here to view.

Overcoming the Cybersecurity Skills Shortage

The Register’s recent article on the cybersecurity skills shortage certainly offers a catchy title, “Hand in your notice – by 2022 there’ll be 350,000 cybersecurity vacancies.” The vacancy estimate...

View Article


Image may be NSFW.
Clik here to view.

Meet Us at Black Hat 2017!

The Swimlane team is headed to Mandalay Bay for Black Hat 2017! Come meet us at our booth or join us for drinks and networking at our cocktail reception! Come say hello! We would love to meet you....

View Article

Image may be NSFW.
Clik here to view.

Security Orchestration | What is Security Orchestration?

As the cyber threat landscape continues to evolve, organizations must put new systems and processes in place to combat threats. Over the last few years, security automation and orchestration has become...

View Article


Image may be NSFW.
Clik here to view.

Realizing an Information Security Risk Management Framework

All organizations face information security risk exposure. Every security manager must confront the reality that there are far more risks than can ever be reasonably managed. So, how does the security...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity Statistics 2017: A Hard Look at the Facts and Future

Cybersecurity statistics have become a bit more ominous as we review the first half of 2017—and according to industry reports, things aren’t looking up anytime soon. From an alarming increase in brute...

View Article

Image may be NSFW.
Clik here to view.

The Need to Integrate Cybersecurity Tools

The best cybersecurity programs blend two basic security concepts: defense in depth and the business impact risk “heat map.” Defense in depth is the practice of building layers of countermeasures to...

View Article
Browsing all 72 articles
Browse latest View live