The role of AI in cybersecurity operations

Security operation centers (SOCs) need to be better equipped to manage the sheer scale of data to monitor and the increasing sophistication of threats. SOC analysts face a daunting task: sifting through thousands of alerts every day – most of whi… Continue reading The role of AI in cybersecurity operations

From the SOC to Everyday Success: Data-Driven Life Lessons from a Security Analyst

By taking a data-driven approach to life, grounded in truth and facts, we can improve our chances of making better decisions and achieving better results.
The post From the SOC to Everyday Success: Data-Driven Life Lessons from a Security Analyst appe… Continue reading From the SOC to Everyday Success: Data-Driven Life Lessons from a Security Analyst

Security analysts believe more than half of tasks could be automated

Security industry leaders believe that AI and automation technologies are critical to addressing the complexities of modern security operations, according to Anomali. AI expected to boost threat detection In fact, security analysts maintain that up to … Continue reading Security analysts believe more than half of tasks could be automated

StrikeReady Raises $12M to Build AI-Powered Security Command Center

StrikeReady, an early-stage Silicon Valley startup working on technology to modernize cybersecurity command centers, has banked $12 million in new financing from 33N Ventures. The Palo Alto, Calif.-based StrikeReady said the Series A included equity in… Continue reading StrikeReady Raises $12M to Build AI-Powered Security Command Center

Reinforcement learning is the path forward for AI integration into cybersecurity

AI’s algorithms and machine learning can cull through immense volumes of data efficiently and in a relatively short amount of time. This is instrumental to helping network defenders sift through a never-ending supply of alerts and identify those that p… Continue reading Reinforcement learning is the path forward for AI integration into cybersecurity

Demystifying SOC-as-a-Service (SOCaaS)

Threat actors aren’t looking for companies of specific sizes or industries, they are looking for opportunities. Given that many companies operate in the dark and overlook breaches until ransomware attacks occur, this makes the threat actors’ job easy. … Continue reading Demystifying SOC-as-a-Service (SOCaaS)