Security News
The audit, conducted by Coalfire, found that Sysdig meets the SOC 2 standards for security and availability. "As a SaaS-first company that delivers a security and visibility platform for many of the largest organizations, Sysdig takes the protection of its customers' data extremely seriously. Successfully navigating SOC 2 Type II compliance further validates our commitment and the robust controls in place to ensure the secure and confidential management of customer data," said Stefan Reicheneder, head of security and compliance at Sysdig.
Cyberbit partners with Optiv to bring simulation-based SOC Team training to clients in North America
Cyberbit announced a new partnership with Optiv to bring simulation-based SOC Team training to Optiv clients throughout North America. Through this strategic partnership, Optiv will offer the Cyberbit platform to train cybersecurity teams from "Zero to hero," developing skills in cyber labs before responding to real-world cyberattacks, simulated in a virtual SOC within the cyber range.
Let's break down these three scenarios and share how XDR is positioned to help. With the XDR market incorporating automation and orchestration, this reduces human effort, human errors, and can directly impact time to respond if the XDR console allows orchestrated, real-time response.
In his paper, Prevention is Futile in 2020: Protect information Via Pervasive Monitoring and Collective Intelligence, he projected that by 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches, up from less than 10% in 2013. In subsequent years, the definition shifted towards detection and response with vulnerability management remaining part of security operations, but not a core focus of the SOC. In 2017, Gartner began describing SOAR as the convergence of SOA, SIR and threat intelligence.
Stellar Cyber announced that Deeptree has selected the Stellar Cyber platform as the basis of its intelligent next generation SOC. Through this partnership, Deeptree can bring tailored, enterprise-class cybersecurity services to customers of all sizes. The Stellar Cyber platform goes beyond other SOC solutions in that it tightly integrates native capabilities, such as network detection response, cloud detection response and SIEM, while also analyzing data from existing third-party solutions to provide the most comprehensive security protection throughout the kill chain.
Cadence Design Systems announced Cadence System-Level Verification IP, a new suite of tools and libraries for automating system-on-chip testbench assembly, bus and CPU traffic generation, cache-coherency validation and system performance bottleneck analysis. Using Cadence System VIP, customers creating complex hyperscale, automotive, mobile and consumer chips can improve chip-level verification efficiency by up to 10X. The new Cadence System VIP solution takes Cadence's market leadership in IP-level verification automation and brings it to the chip level.
Dell's Chief Security Officer John Scimone runs a converged security organization, which creates an unusually broad view of security risks. The security team at Dell also holds regular joint strategy and operational planning meetings that include physical and digital security professionals, resilience professionals and business unit security leaders.
At the RSA Cybersecurity Summit 2020 on Tuesday, security experts explained how to rethink the security operations center when analysts are working from home instead of side by side. Two RSA leaders shared advice on how to do this during a conversation about how the shift to 100% remote work has affected security teams who have the same challenges all other remote workers have.
Being able to deliver these secure integrated managed services in the Netherlands is a first for Thales. From now on, Thales will be able to offer this service for and from the Netherlands.
On the one hand, 72% of firms consider the SOC a key part of their security strategy; but on the other hand, 60% of SOC staff have considered changing careers because of stress, while 65% claim to have limited visibility into the attack surface. A survey of 600 professionals working in IT and security, conducted by Ponemon and commissioned by Devo, seeks to better understand the causes behind the effective and ineffective areas of SOCs.