3 Reasons Why Technology Integration Matters

As John Donne once wrote, “No man is an island entire of itself.” With digitalization bridging any distance, the same logic could be applied to tech. Threat actors have vast underground forums for sharing their intelligence, while security professionals remain tight-lipped in a lot of data breach cases. Much like the way a vaccine can […]

The post 3 Reasons Why Technology Integration Matters appeared first on Security Intelligence.

Continue reading 3 Reasons Why Technology Integration Matters

Five Key Trends on SOC Modernization

For SOCs looking to improve their ability to detect and respond to threats efficiently and effectively, Extended Detection and Response (XDR) has generated increasing amounts of excitement and discourse in the industry. XDR was one of the hottest topics at RSA 2022, but like with many “hot new trends,” perspectives on what XDR actually is, […]

The post Five Key Trends on SOC Modernization appeared first on Security Intelligence.

Continue reading Five Key Trends on SOC Modernization

MITRE ATT&CK and SIEM Rules: What Should Your Expectations Be?

The MITRE ATT&CK threat framework is seemingly everywhere these days, and with good reason. It is an invaluable tool for understanding the various methods, or as MITRE refers to them Tactics and Techniques, employed by threat actors. It offers annotated and curated details about those methods, and it provides the capability to visualize this data […]

The post MITRE ATT&CK and SIEM Rules: What Should Your Expectations Be? appeared first on Security Intelligence.

Continue reading MITRE ATT&CK and SIEM Rules: What Should Your Expectations Be?

Putting Your SOC in the Hot Seat

Today’s Security Operations Centers (SOCs) are being stress-tested as never before. As the heart of any organization’s cybersecurity apparatus, SOCs are the first line of defense, running 24/7 operations to watch for alerts of attacks and appropriately address those alerts before they become all-out crises. Yet with ransomware attacks maintaining first place as the top […]

The post Putting Your SOC in the Hot Seat appeared first on Security Intelligence.

Continue reading Putting Your SOC in the Hot Seat

Building the CASE for the Vehicle Security Operations Center

This post was written with contributions from IBM Security’s Rob Dyson, Preston Futrell and Brett Drummond. Let’s explore a day in the life of a vehicle security operations center (VSOC). An autonomous vehicle is transporting passengers to their destination. Inside the vehicle, they are patiently waiting to arrive at their destination and, in the meantime, […]

The post Building the CASE for the Vehicle Security Operations Center appeared first on Security Intelligence.

Continue reading Building the CASE for the Vehicle Security Operations Center

Taking Threat Detection and Response to the Next Level with Open XDR

The challenges facing today’s security industry can easily be described as a perfect storm: increasingly sophisticated cyber attackers combined with the proliferation of security tools to cover an expanding attack surface driven by remote work and cloud adoption. These dynamics can lead to disconnected insights and data, putting even more pressure on the existing shortage […]

The post Taking Threat Detection and Response to the Next Level with Open XDR appeared first on Security Intelligence.

Continue reading Taking Threat Detection and Response to the Next Level with Open XDR

Critical Infrastructure Attack Trends: What Business Leaders Should Know

Amateur threat actors have been able to compromise critical infrastructure like industrial control systems (ICS) and other operational technology (OT) assets more often lately. Compromises of exposed OT assets rose over the past 18 months, according to threat researchers at Mandiant, with attackers using readily-available tools and common techniques to gain access to the systems. […]

The post Critical Infrastructure Attack Trends: What Business Leaders Should Know appeared first on Security Intelligence.

Continue reading Critical Infrastructure Attack Trends: What Business Leaders Should Know

How the Rise of the Remote SOC Changed the Industry

What does the rise of remote security operations centers (SOCs) mean for cybersecurity jobs? The longer people work from home during the pandemic, the more they rate remote working a success for their companies. While companies of all sizes are still working out the details of what the return to work looks like, the consensus […]

The post How the Rise of the Remote SOC Changed the Industry appeared first on Security Intelligence.

Continue reading How the Rise of the Remote SOC Changed the Industry

How AI in Cybersecurity Addresses Challenges Faced by Today’s SOC Analysts

Today’s security operations centers (SOC) have to manage data, tools and teams dispersed across the organization, making threat detection and teamwork difficult. There are many factors driving complex security work. Many people now work from home with coworkers in far-away places. The cost and maintenance of legacy tools and the migration to cloud also make […]

The post How AI in Cybersecurity Addresses Challenges Faced by Today’s SOC Analysts appeared first on Security Intelligence.

Continue reading How AI in Cybersecurity Addresses Challenges Faced by Today’s SOC Analysts

Unleash the Power of MITRE for a More Mature SOC

The MITRE adversarial tactics, techniques and common knowledge (ATT&CK) framework brings pooled knowledge from across the cyber defense community, including revealing what threat actors are up to and how best you can defend against them. Let’s take a look at what MITRE offers and how this framework goes hand-in-hand with developing a security operations center (SOC) […]

The post Unleash the Power of MITRE for a More Mature SOC appeared first on Security Intelligence.

Continue reading Unleash the Power of MITRE for a More Mature SOC