Research, Security Operations

Designing an Effective SOC Part II- How to Build an Efficient & Effective SOC

Today’s SOC models provide two options: build a labor-intensive in-house SOC or outsource to an MSSP. In Part-1 of this two-part series Larry Ponemon shared how dissatisfied security professionals are with the inefficiencies found in both models. Now in Part II, Chris provides a practical guide for designing a new modern SOC model that combines humans and machines to deliver more efficiency and ROI.

Research, Security Operations

Designing an Effective SOC Part I – The Economics of Security Operations

Ponemon Insights - Despite significant investments in 2019, half of the security managers in the survey report that their SOC is ineffective at detecting attacks. What’s keeping us stuck? In Part One of this two-part series, Larry Ponemon joins Respond Software to discuss the most recent Ponemon Report findings, new insights into the economics and effectiveness of SOCs.

Perspective, Security Analysts, Security Operations

AI: ‘We’re Having the Wrong Conversation’

In a video interview at Information Security Media Group’s recent Fraud and Breach Summit in Washington, Chris Calvert discusses: What’s misunderstood about AI; Proper security roles for humans vs. machines; How enterprises need to organize cybersecurity...

Perspective, Security Analysts, Security Operations

Fintech CISO Shares 5 Tips: How Kyriba Automated SecOps

Build a world-class security operation with a lean, nimble team. When security leaders are asked to ‘do more with less’, their choices are 1) reduce their team size 2) think out of the box 3)...

Product, Security Analysts

Security Analysts: Finding Incidents Using Web Filtering Data

Web filter logs contain valuable security data that can be used to recognize adversaries within your network. This data is a top source for incident responders and forensic investigations — once an attack has already been identified. However, the size and complexity of this data makes it nearly impossible to analyze and monitor, let alone to be able to do this in real-time. Respond Analyst is the first security decision automation solution that brings this data to frontline analysis where it’s more valuable. Real-time analysis and triage of web filter data, during network and endpoint analysis, gives security teams an edge in reducing response times and limiting the impact of some of the most stealthy attacks.

Product, Security Options

Finding Hidden Meaning in your Palo Alto Networks IPS/IDS Deployments

Feeling like you can’t keep up with the volume of your Palo Alto IPS events? You’re not alone. Nearly every team feels the pain of a mountain of data and an ever decreasing amount of time to accurately review alerts. Luckily, there are solutions to analyze alerts so you find those that are truly malicious and actionable - with only an out-of-the-box expert system.