The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a ...
Swimlane and Dragos Operational Technology

Why OT Cybersecurity Needs a Low-Code Solution

The post Why OT Cybersecurity Needs a Low-Code Solution appeared first on AI Enabled Security Automation ...

Log Formatting Best Practices for Improved Security

In the event of a security breach, logs play a crucial role in understanding the ...
Build a Modern SOC

How to Build a Modern Security Operations Center (SOC)

The post How to Build a Modern Security Operations Center (SOC) appeared first on AI Enabled Security Automation ...
SOC Best Practices

SOC Best Practices You Should Implement

The post SOC Best Practices You Should Implement appeared first on AI Enabled Security Automation ...
Gartner outlines top cybersecurity trends — and (spoiler alert) AI is No. 1

Gartner outlines top cybersecurity trends — and (spoiler alert) AI is No. 1

Artificial intelligence will be the leading cybersecurity trend in 2024, analyst firm Gartner has predicted in a new release ahead of its upcoming Gartner Security & Risk Management Summit in Sydney, Australia ...
Operation Cronos and the LockBit takedown: What we know

Operation Cronos and the LockBit takedown: What we know

The United Kingdom’s National Crime Agency (NCA), in collaboration with the U.S., Canada and eight other international partners shared a major update this past Tuesday regarding Operation Cronos, the international disruption campaign ...
George Sandford - Don’t Get Tangled Up in Your Cape: Hero Culture as a Negative Force in Cyber

4 ways hero culture is killing your security program’s effectiveness

| | security operations
Who doesn't love a good hero? In the movies, when the hero swoops in and averts disaster, they receive copious accolades, everyone's satisfied, and the credits roll. In the sequels, new disaster ...
Blueprint for Threat Intel to Detection Flow (Part 7)

Blueprint for Threat Intel to Detection Flow (Part 7)

This blog series was written jointly with Amine Besson, Principal Cyber Engineer, Behemoth CyberDefence and one more anonymous collaborator.In this blog (#7 in the series), we will cover more details on the ...
Migrate Off That Old SIEM Already!

Migrate Off That Old SIEM Already!

This is cross-posted from Google Cloud Community site, and written jointly with Dave Herrald.If you are like us, you may be surprised that, in 2024, traditional security information and event management (SIEM) systems ...