Check Point plans to purchase an external risk management vendor led by an Israeli intelligence veteran to boost its SOC and managed threat intelligence capabilities. The proposed acquisition of Cyberint will make it easier for companies to defend against both internal and external cyberthreats.
The SIEM market is experiencing significant upheaval, with your go-to products being bought out, merged, or even dismantled. This wave of change might have you questioning the future landscape of your cybersecurity tools and whether your current security stack is still the best fit for your organization. In this...
In an era where cyber threats are increasingly complex and AI-driven, selecting the right SIEM solution is more critical than ever. The right SIEM can be the cornerstone of an effective cyber defense strategy. However, the decision-making process is layered with complexities, from evaluating your current technology...
Clarence Worrell, senior data scientist, CERT Division of Carnegie Mellon University's Software Engineering Institute, discusses how machine learning transforms threat detection and highlights practical applications and emerging challenges in cybersecurity.
The network security landscape is undergoing a significant transformation. Phil Owens, vice president of customer solutions at Stamus Networks, discusses the strategic shift in network security toward enhanced transparency and reduced alert fatigue, which are essential for robust cybersecurity.
With employees working remotely and accessing resources and services across public, private, and hybrid clouds through several devices and networks, the attack surface for malicious actors continues to grow.
SOC teams can harden their security posture by combining security and IT operations solutions to defend...
When an organization decides to modernize a Security Operations Center (SOC) or implement a more formal security program, they must make a number of important decisions. What workbench will they use? Will the IT operate 24 hours a day? How will they resource the SOC? What team structure will they use? How long will it...
Arctic Wolf last week announced plans to buy SOAR platform provider Revelstoke in a move to boost Arctic Wolf's automated response capabilities and lay the groundwork for "deeply embedded" AI and machine learning. CEO Nick Schneider explained how the deal will benefit customers and drive innovation.
Join Cisco experts as they talk about what effective automation looks like, what automation in the world of XDR really means, and why it’s vital for you to start using
Security operations demand massive scale to collect, process, analyze, and act upon massive amounts of data. Early XDR was anchored to two primary data sources: endpoints and networks. While this was an improvement on disconnected EDR and NDR tools, threat detection and response across enterprise organizations demands...
With employees working remotely and accessing resources and services across public, private, and hybrid clouds through several devices and networks, the attack surface for malicious actors continues to grow.
SOC teams can harden their security posture by combining security and IT operations solutions to defend...
This Expel Quarterly Threat Report (QTR) delivers intelligence you can put into play today on some of the most active attack vectors our SOC leadership team observed in the first quarter of this year. By sharing how attackers got in, and how we stopped them, we’ll translate the security events we detect into...
Zero Trust presents a significant change to traditional enterprise architectures, where a "trust but verify" model sufficed prior to digital transformation initiatives and pervasive cloud adoption. Today, the primary goal of Zero Trust in the SOC is the continued audit and maintenance of a strong security...
One of the biggest challenges facing healthcare providers like Penn State Health is that cyber security threats are always evolving. Threat actors are becoming increasingly sophisticated, continually finding new vulnerabilities and new ways to exploit them.
Download this case study to learn how to:
Keep ahead of the...
Summa Equity bought a majority stake in Logpoint to help the security operations firm expand in areas such as automation, detection and response, and attack surface management. The sustainable growth fund says the acquisition will allow the company to acquire technologies in adjacent areas.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.