Security News

PLDA launches XpressRICH PCI Express 6.0 Controller IP for SoC designers and system architects
2021-05-26 00:30

PLDA announced the launch of their XpressRICH PCI Express Controller IP for the PCIe 6.0 specification. To compensate for the higher BER, XpressRICH for PCIe 6.0 architecture implements FEC combined with CRC. XpressRICH for PCIe 6.0 architecture also supports the new L0p low power mode, enabling traffic to be transmitted on a reduced set of lanes, reducing power consumption without impacting traffic flow.

Shujinko’s free automation software helps auditors and clients streamline SOC 2 preparation and readiness
2021-05-19 01:00

Shujinko announced the availability of free automation software to help auditors and their clients streamline SOC 2 audit preparation and readiness. This free solution includes the full capabilities of AuditX for SOC 2, automating evidence collection, mapping and crosswalking, while dramatically streamlining audit workflow and collaboration for compliance certification.

Poor collaboration between NOC and SOC hampers digital transformation efforts
2021-05-05 15:31

According to a new study, Digital Transformation Needs a More Perfect Union, released Wednesday by secure access service edge provider Netskope, networking and security teams do not work well together, if at all. "The evident divide between networking and security teams has been an issue for some time, but has been even more amplified with the rapid acceleration to remote work," Mike Anderson, chief information and digital officer at Netskope, said in a statement.

As You Modernize Your SOC, Remember the Human Element
2021-04-22 16:08

As Security Operations Centers mature, they need to tackle some tough challenges with respect to data, systems and people. As Security Operations Centers mature and transition to become detection and response organizations, they need to tackle some tough challenges with respect to data, systems and people.

The SOC is blind to the attackable surface
2021-04-12 04:45

Organizations have piled security controls upon security controls, and still remain largely blind to the most serious threats they face. Firewalls, vulnerability management and endpoint tools may offer a base layer of protection, but they are inherently weak without an added layer that includes analysis of daily exposures caused by configuration errors, exploitable vulnerabilities, mismanaged credentials and other common points of risk.

Improve Data Utilization to Modernize the SOC
2021-04-01 11:12

If you want to modernize your SOC to focus on detection and response you need to start by capturing the right data. The next challenge is improving data utilization by collaborating with the teams and organizations that make up your entire enterprise, to mitigate risk across your environment.

Want to Modernize Your SOC? Start with Data
2021-03-18 13:24

Many organizations today deal with data that is noisy and unstructured, decentralized without prioritization, and managed with spreadsheets. To gain a comprehensive understanding of the threats you are facing and what you must defend, you need to start by aggregating internal data from across the entire ecosystem - the telemetry, content and data created by each layer in your security architecture, on-premises and in the cloud.

CrowdStrike Falcon platform enhancements improve SOC efficiency
2021-03-05 03:45

CrowdStrike announced enhancements to the CrowdStrike Falcon platform that significantly improve Security Operations Center efficiency and effectiveness, allowing security teams to focus on critical priorities and fortify their organizations' proactive stance against cyber threats. CrowdStrike customers can accelerate their security operational response with new notification workflows and Real Time Response capabilities within the CrowdStrike Falcon platform, automating full-cycle incident response.

Very Good Security helps organizations achieve SOC 2 compliance with VGS Control
2021-02-28 23:45

Very Good Security has further cemented its commitment to securing the world's information by empowering organizations to prepare for their first SOC 2 audits completely free with VGS Control. VGS employs a fundamentally different approach to data security and compliance, which drastically improves an organization's ability to seek and maintain SOC 2 compliance using VGS Control.

Elevate the Value of Threat Intelligence in the SOC
2021-02-18 13:49

More organizations are producing and consuming cyber threat intelligence than ever before, and those measuring the effectiveness of their CTI programs is higher than ever - jumping from 4% in 2020 to 38% in 2021, according to the SANS 2021 Cyber Threat Intelligence Survey. A few areas where CTI adoption seems to be lacking are in integration, automation and operationalizing threat intelligence.