Agentic AI in SOCs: A Solution to SOAR’s Unfulfilled Promises

September 25, 2024 at 06:27AM Security Orchestration, Automation, and Response (SOAR) was introduced to revolutionize Security Operations Centers (SOCs) through automation, reducing manual workloads and enhancing efficiency. However, despite three generations of technology and 10 years of advancements, SOAR hasn’t fully delivered on its potential. Agentic AI emerges as an alternative to effectively automate SOC … Read more

4 Top Security Automation Use Cases: A Detailed Guide

September 18, 2024 at 11:50AM Gartner has reported the phasing out of SOAR in favor of AI-based solutions. This article details four key security automation use cases: enriching Indicators of Compromise, monitoring the external attack surface, scanning for web application vulnerabilities, and monitoring email addresses for stolen credentials. Each use case includes an automation workflow … Read more

Optiv Report Shows Nearly 60% Increase in Security Budgets as Most Organizations Report Cyber Breaches and Incidents

June 26, 2024 at 05:56PM Optiv’s 2024 Threat and Risk Management Report, based on a Ponemon Institute survey, highlights a 59% spike in cyber budgets. The report emphasizes the urgency for organizations to prioritize cybersecurity investments, as data breaches and security incidents continue to rise. Key findings include security tool overload, top investment areas, lack … Read more

Scaling Security Operations with Automation

December 6, 2023 at 06:00AM Amid growing digital security threats, organizations face challenges implementing automation due to resource constraints and a need for clear processes. While automation can enhance security operations by handling repetitive tasks and reducing errors, success requires assessing readiness, prioritizing impactful processes, and integrating solutions with workflows. Operational guidance and continuous improvement … Read more

Enhancing Incident Response Playbooks With Machine Learning

December 4, 2023 at 08:19PM Companies need specific playbooks for effective cyber incident response, as tools and general plans without adequate processes often lead to intrusions. Experts advocate integrating artificial intelligence and machine learning into playbooks for faster, more effective responses, despite concerns over control and compliance in sensitive areas. Automation is increasing, with a … Read more