Security News
SOC analytics and automation, including security monitoring and incident management tools, are now mission-critical apps and services that are required to support revenue generation in today's changing business landscape. Let's take a look at why analytics and automation are so vital for modern security teams, the possible downsides, and why a cloud-native platform is the future for the SOC. Three core benefits.
Insert Sigma Rules for SIEMS; a way for Security Operations to implement standardization into the daily tasks of building SIEM queries, managing logs, and threat hunting correlations. What is a Sigma rule, you may ask? A Sigma rule is a generic and open, YAML-based signature format that enables a security operations team to describe relevant log events in a flexible and standardized format.
A Cyberbit report reveals how organizations are currently building the human element of their InfoSec organization-shedding light on current practices including job requirements, the recruiting process, current skills levels, training impacts, and integration of industry best practices. "This first annual SOC Skills Survey sheds a critical light on how companies are fulfilling-and falling short-on cyber team requirements to maintain a strong cyber defense posture," said Steve Burg, Director of Product Marketing at Cyberbit.
Port53 Technologies announced the launch of their new SOC-as-a-Service, offering 24/7 monitoring, detection, and response. Port53 harnesses the power of Cisco SecureX to provide a completely unique SOC-as-a-Service offering for the SMB and SME market.
CYDERES announced a partnership with SOC Prime to bring SOC Prime detection content to all CYDERES managed security customers. Through the partnership, CYDERES customers benefit immediately from the SOC Prime Threat Detection Marketplace, the largest SaaS threat detection content platform in the world used by more than 12,000 security practitioners from 6,000-plus companies.
Drata helps companies streamline their SOC 2 compliance through continuous, automated control monitoring and evidence collection, resulting in lower costs and time spent preparing for annual audits. "Drata is a team of seasoned entrepreneurs and engineers who have a successful track record and have worked together for more than 10 years. The platform they developed truly delivers on the promise of automation to reduce the burden of SOC 2 compliance and sets companies up for continuous monitoring which is coming in the future," said Ted Wang, Partner at Cowboy Ventures.
Organizations are spending more to account for widespread security operation center challenges including growing security management complexity, increasing analyst salaries, security engineering and management outsourcing costs, yet are still dissatisfied with the outcomes, Ponemon Institute and FireEye reveal. "The findings of the Ponemon Economics of the SOC report show that organizations are facing an onslaught of rising security operations costs, but despite these increased investments, are still unhappy with their ability to combat growing cyberthreats," said Chris Triolo, VP of Customer Success, FireEye.
The audit, conducted by Coalfire, found that Sysdig meets the SOC 2 standards for security and availability. "As a SaaS-first company that delivers a security and visibility platform for many of the largest organizations, Sysdig takes the protection of its customers' data extremely seriously. Successfully navigating SOC 2 Type II compliance further validates our commitment and the robust controls in place to ensure the secure and confidential management of customer data," said Stefan Reicheneder, head of security and compliance at Sysdig.
Cyberbit partners with Optiv to bring simulation-based SOC Team training to clients in North America
Cyberbit announced a new partnership with Optiv to bring simulation-based SOC Team training to Optiv clients throughout North America. Through this strategic partnership, Optiv will offer the Cyberbit platform to train cybersecurity teams from "Zero to hero," developing skills in cyber labs before responding to real-world cyberattacks, simulated in a virtual SOC within the cyber range.
Let's break down these three scenarios and share how XDR is positioned to help. With the XDR market incorporating automation and orchestration, this reduces human effort, human errors, and can directly impact time to respond if the XDR console allows orchestrated, real-time response.