Connecting the SOC to IT with Digital Workflows via ServiceNow

A common challenge security operations centers face is competing remediation and recovery actions fast. If the analyst has the authority…
The post Connecting the SOC to IT with Digital Workflows via ServiceNow appeared first on Siemplify.
The post Co… Continue reading Connecting the SOC to IT with Digital Workflows via ServiceNow

Understanding Microsoft’s OAuth2 implementation – Part 3: Using Microsoft Graph API

In this third and final part of the “Understanding Microsoft’s OAuth2 Implementation” series, we will be using the application that we have previously created to authenticate to the Microsoft Graph API. If you have not done so, please read Part 1 and Part 2 before continuing. Now, let’s start using the Microsoft Graph API using PowerShell Core! Using PowerShell Core …

The post Using Security Automation and Orchestration for SIEM Triage appeared first on Swimlane.

The post Understanding Microsoft’s OAuth2 implementation – Part 3: Using Microsoft Graph API appeared first on Security Boulevard.

Continue reading Understanding Microsoft’s OAuth2 implementation – Part 3: Using Microsoft Graph API

Understanding Microsoft’s OAuth2 implementation – Part 2: Registering an application

In my last post, I explained the different API endpoints available for authentication using Microsoft’s OAuth2. Additionally, I shared the different types of applications and their authentication flows. In Part 2, I will discuss how to create and register a new application with a deeper understanding of the permissions needed when interacting with the Microsoft Graph API. Registration Before you …

The post Using Security Automation and Orchestration for SIEM Triage appeared first on Swimlane.

The post Understanding Microsoft’s OAuth2 implementation – Part 2: Registering an application appeared first on Security Boulevard.

Continue reading Understanding Microsoft’s OAuth2 implementation – Part 2: Registering an application

Understanding Microsoft’s OAuth2 implementation – Part 1: Endpoints and application types

As an information security or IT professional, understanding the concepts around Microsoft OAuth 2.0 or OpenID Connect authentication can be daunting. There are thousands of pages of documentation, and if you want to interact with a Microsoft Cloud service—like Microsoft Graph—it can be a minefield of information. In this three-part series, I am going to share with you my insights …

The post Using Security Automation and Orchestration for SIEM Triage appeared first on Swimlane.

The post Understanding Microsoft’s OAuth2 implementation – Part 1: Endpoints and application types appeared first on Security Boulevard.

Continue reading Understanding Microsoft’s OAuth2 implementation – Part 1: Endpoints and application types

Siemplify and the Palo Alto Application Framework Making case investigation and response fast

Seconds. That’s all it takes for an attacker to exploit a vulnerability in a security framework. Once safely inside the environment attackers will attempt to stay in the shadows so they can carry out their nefarious goals. The job of the security… Continue reading Siemplify and the Palo Alto Application Framework Making case investigation and response fast

Bolster your security ecosystem with security partnerships

The security operations center (SOC) of today typically has a vast ecosystem of disparate people, processes and technologies. Not only does Swimlane’s security orchestration, automation and response (SOAR) platform integrate these varying securit… Continue reading Bolster your security ecosystem with security partnerships

ServiceNow-Box integration brings together two enterprise cloud stalwarts

It used to be a one-vendor, stack-driven world in the enterprise. Today, the cloud has changed that and best of breed and interoperability are the watchwords of the day. Two enterprise cloud stalwarts have announced a new integration that brings Box content directly into ServiceNow. For ServiceNow customers, it means that they can access Box […] Continue reading ServiceNow-Box integration brings together two enterprise cloud stalwarts

What’s In Our SecOps Stack: 6 Top Integrations

When it comes to creating a solid SecOps program, an organization must consider people, processes, and technology. It’s not one area that makes a secure program, but a combination of all three working together. As good as our people are, however,… Continue reading What’s In Our SecOps Stack: 6 Top Integrations

What are the Features of Cloud IAM?

Identity and access management (IAM) has been a foundational part of IT for nearly two decades now. The world of IT has experienced dramatic changes during that time, yet legacy IAM solutions haven’t changed to match. Conventional IAM has long be… Continue reading What are the Features of Cloud IAM?

Kloudless raises $6M for its integrations solution

Kloudless makes it easier for developers to connect their applications to a variety of third-party tools for file storage, customer management, calendaring and other services through a unified API. It’s a bit like an IFTTT for developers. Today, the company announced that it has raised a $6 million Series A round led by Aspect Ventures, […] Continue reading Kloudless raises $6M for its integrations solution