SonicWall acquired a longtime master MSSP partner to bring MDR, SOC and vulnerability management capabilities to its managed service providers. Buying Solutions Granted will help SonicWall detect and respond to endpoint or cloud-based threat activity on behalf of its MSP and MSSP partners.
Cybersecurity automation can make a dramatic difference in both team performance and costs. However, calculating tangible ROI on purchases can be difficult. And quantifying ROI is critical to buy-in from leadership.
This guide shows that when choosing a SOAR platform, make sure it meets your current automation...
Security hygiene and posture management has become increasingly difficult because of factors like a growing attack surface, the increased use of cloud computing, and the need to support a remote workforce.
To assess how organizations approach SHPM today, Enterprise Strategy Group (ESG) recently surveyed IT and...
In the ever-evolving battlefield of cybersecurity, merely detecting and responding to threats is no longer enough. It's time to adopt a proactive approach and accelerate your organization's cyber resilience.
Check out this whitepaper to learn how to unveil powerful strategies to move beyond traditional detection...
Two cybersecurity vendors are laying off a sizable chunk of their staff, with Exabeam axing 20% of its workforce and F-Secure cutting up to 70 employees. Exabeam eliminated roughly 134 positions this week, while F-Secure wants to shrink its workforce by nearly 14%.
Arctic Wolf last week announced plans to buy SOAR platform provider Revelstoke in a move to boost Arctic Wolf's automated response capabilities and lay the groundwork for "deeply embedded" AI and machine learning. CEO Nick Schneider explained how the deal will benefit customers and drive innovation.
This latest Quarterly Threat Report (QTR) distils the trends, notable new behaviours, and unusual attacks we saw over the last quarter. Also utilizing previous threat reports to compare findings and point out patterns–and even provide some solutions for avoiding the latest threats.
By dissecting how attackers got...
Not so long ago, security organizations rallied behind best of breed security solutions. But now, trying to reduce tech debt, rationalize tools and consolidate vendors, there is a push for the platform approach. Cisco's Amilcar Alfaro talks about how to tap into the platform advantage.
A fortune 100 company needed to carve out healthcare data from their shared model, with a specific environment and SOC projected data growth year over year within 60 days.
Download this case study to see how they:
Were able to obtain a modern and scalable cloud-native architecture;
Extended visibility into...
When an organization decides to modernize a Security Operations Center (SOC) or implement a more formal security program, they must make a number of important decisions. What workbench will they use? Will the IT operate 24 hours a day? How will they resource the SOC? What team structure will they use? How long will it...
Security Information and Event Management (SIEM) solutions have been around for more than 20 years in various incarnations. In the original SIEM models, the operational back end was entirely on-premises from the databases to the front-end applications, including user interfaces, case management features, and...
It turns out SIEM isn't on life support after all. Cisco is providing 28 billion reasons to believe enterprises aren't scrapping the security operations center staple anytime soon, even though rivals with other types of security technology have attempted to write SIEM's obituary for years.
The C-suite and boards are more involved in cybersecurity decisions than ever before, but executive leaders still have a huge disconnect between perceptions and operational realities. This gap leads to miscommunication and missed expectations that could pose great risks to the enterprise, said Cody Cornell, co-founder...
Introducing automation into your SOC enables your analysts to focus on the most critical threat detection, hunting, and response activities.
Threat actors are faster and more sophisticated than most SOCs. Coupled with an explosion of data (and resulting attack surfaces), many SOC teams are discouraged and burnt...
Costa Rica will build a national cybersecurity operations center with substantial U.S. backing following a crippling cyberattack last year and will also commit to using only trusted 5G providers. The U.S. Department of State has extended $25 million to build a virtual security operations center.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.