Security News
Exabeam's 2020 State of the SOC Report reveals that 82% of SOCs are confident in the ability to detect cyberthreats, despite just 22% of frontline workers tracking mean time to detection, which helps determine hacker dwell time. Compounding this unfounded confidence, 39% of organizations still struggle with SOC staff shortages and finding qualified people to fill the cybersecurity skills gap.
Stellar Cyber announced that CyFlare has deployed the Stellar Cyber platform as the core of its Security Operations Center service. While many MSSPs cobble together complete solutions from a dozen or more different products and then have trouble correlating detections to stop complex attacks, Stellar Cyber's platform is a complete solution with more than 20 natively-supported applications that present detections in an intuitive dashboard.
Vectra Integrates Cognito with Microsoft Defender ATP and Azure Sentinel to Form a SOC Visibility Triad. San Jose, Calif-based threat detection firm Vectra has integrated its network threat detection and response Cognito platform with Microsoft Defender and Microsoft Azure Sentinel to deliver Gartner's concept of the SOC Visibility Triad. Gartner introduced the idea of the SOC Visibility Triad in March 2019. The new native integration between Vectra's Cognito and Microsoft's Defender and Sentinel is designed to provide the SOC with full oversight of the state of the infrastructure, and better ability to respond to suspicious events.
The British Army has raised a new regiment that will take charge of its in-house security operations centre, a move calculated to make cyber defence a more mainstream part of all things armed and camouflaged. The Ministry of Defence stated that 13 Sigs will "Provide the basis of the new Army Cyber Information Security Operations Centre, focusing on the protection of Defence's cyber domain."
Filling the information gap therefore involves looking at how to make the most of the data that is coming in, without paralyzing the process or relying on manual intervention. Achieving the right security posture will instead involve looking at the data, the analysis and the real-time requirements together.
Efficiency in the security operations center is more critical than ever, as organizations have to deal with limited SOC resources. The SOC is a centralized team of analysts, engineers, and incident managers who are responsible for detecting, analyzing, and responding to incidents and keeping security operations tight and resilient - even when security strategy fails.
For ages, the mainframe was like macOS - considered natively secure and not at risk of attack or compromise. The reality is that the mainframe is securable, but it is definitely not guaranteed to be secure.
Many online training sites are offering significantly reduced prices on training programs during the month of May. This roundup includes free courses for people who are new to cybersecurity as well as specialized courses about security for the Internet of Things and California's new privacy law. Free online courses for security basicsIf you're not ready to spend money on cybersecurity training, take a look at the SANS Cyber Aces Online Courses.
Faraday Technology Corporation, a leading ASIC design service and IP provider, announced its SoCreative!V SoC development platform based upon Faraday's A500 SoC in UMC's 28HPC process. The platform features an ARM Cortex-A53 Quad core with up to 1.4GHz clock rate; delivering an all-in-one solution with multiple, extendable, high-speed interfaces addressing current market demands for high-performance computing applications, such as 5G, networking, AIoT, High-Def Projectors, Multimedia, and MFP. With the introduction of the SoCreative!V Platform, Faraday provides numerous integrated high speed interfaces including DDR4, USB 3.0 OTG, PCIe gen3 and Gigabit Ethernet.
SOC 2 compliance is evaluated by independent third-party auditors who assess a company's ability to comply with these core principles. SOC 2 was developed by the American Institute of CPAs and designed specifically for service providers that store customer data in the cloud, meaning virtually every SaaS company operating today should consider achieving SOC 2 compliance.