Arming your Security Operations Center with SOAR

Covid-19 has only exacerbated an already challenging threat landscape for today’s security operations (SecOps) teams, and bad actors are capitalizing on the chaos. Some related vulnerabilities include increased phishing attacks, questionable domain reg… Continue reading Arming your Security Operations Center with SOAR

Arming your Security Operations Center with SOAR

Covid-19 has only exacerbated an already challenging threat landscape for today’s security operations (SecOps) teams, and bad actors are capitalizing on the chaos. Some related vulnerabilities include increased phishing attacks, questionable domain reg… Continue reading Arming your Security Operations Center with SOAR

Five benefits to implementing security automation using SOAR

Security orchestration, automation and response (SOAR) goes beyond automating tasks that used to be handled manually by working together to effectively, and even proactively, improve your cybersecurity operations. SOAR combines technical capabilities a… Continue reading Five benefits to implementing security automation using SOAR

Tokyo Olympics Postponed, But 5G Security Lessons Shine

Threatpost Senior Editor Tara Seals is joined by Russ Mohr, engineer and Apple evangelist at MobileIron along with Jerry Ray, COO at SecureAge, for a discussion about the now postponed Tokyo Games and its use of 5G and the myriad of security concerns J… Continue reading Tokyo Olympics Postponed, But 5G Security Lessons Shine

Understanding Microsoft’s OAuth2 implementation – Part 3: Using Microsoft Graph API

In this third and final part of the “Understanding Microsoft’s OAuth2 Implementation” series, we will be using the application that we have previously created to authenticate to the Microsoft Graph API. If you have not done so, please read Part 1 and Part 2 before continuing. Now, let’s start using the Microsoft Graph API using PowerShell Core! Using PowerShell Core …

The post Using Security Automation and Orchestration for SIEM Triage appeared first on Swimlane.

The post Understanding Microsoft’s OAuth2 implementation – Part 3: Using Microsoft Graph API appeared first on Security Boulevard.

Continue reading Understanding Microsoft’s OAuth2 implementation – Part 3: Using Microsoft Graph API

Understanding Microsoft’s OAuth2 implementation – Part 2: Registering an application

In my last post, I explained the different API endpoints available for authentication using Microsoft’s OAuth2. Additionally, I shared the different types of applications and their authentication flows. In Part 2, I will discuss how to create and register a new application with a deeper understanding of the permissions needed when interacting with the Microsoft Graph API. Registration Before you …

The post Using Security Automation and Orchestration for SIEM Triage appeared first on Swimlane.

The post Understanding Microsoft’s OAuth2 implementation – Part 2: Registering an application appeared first on Security Boulevard.

Continue reading Understanding Microsoft’s OAuth2 implementation – Part 2: Registering an application