3-steps-to-automating-security-operations
Cybersecurity Analysis

In a perfect world, as security analysts, we’d be capturing data on every process, every action, every...

Chris Calvert
by Chris Calvert
Cybersecurity Analysis

Before being one of the founders of Respond Software, Chris Calvert spent over 30 years in defensive...

Dan Lamorena
by Dan Lamorena
Cybersecurity Solutions

According to a recent survey, “more than 62% of respondents agree with the fact that threat-hunting was...

Mike Reynolds
by Mike Reynolds
Cybersecurity Analysis

Last week I had the opportunity to speak with two CISOs. The first is the CISO of...

Dan Lamorena
by Dan Lamorena
Cybersecurity Analysis

There’s a lot of talk about how things keep getting worse for security operations. The attacks keep...

Chris Calvert
by Chris Calvert
Artificial Intelligence

“Two thirds (69%) of organizations acknowledge that they will not be able to respond to critical threats...

Mike Reynolds
by Mike Reynolds
Security Operations Software

Companies offering international financial services are required to meet the world’s most stringent regulatory compliance and data...

Julie Greene
by Julie Greene
Cybersecurity Analysis

Security analysts are thoughtful, hardworking, quick-witted, and clever. Their shifts are long, and their expertise deep. But...

Chris Calvert
by Chris Calvert
Company

We caught up with Matt just 20 days into his new role to share why he made...

Julie Greene
by Julie Greene

Join our growing community! Subscribe to our newsletter, the "First Responder Notebook," delivered straight to your inbox.