SOC Around the Clock: World Tour Survey Findings

November 4, 2024 at 10:39PM SOC teams aim to enhance cybersecurity by breaking data silos and integrating tools into a unified platform, leveraging AI for faster threat response. Key technologies to explore include AI, zero-trust architectures, and identity management. Utilizing managed services can optimize resources, while a comprehensive platform approach ensures effective risk mitigation and … Read more

Optiv Report Shows Nearly 60% Increase in Security Budgets as Most Organizations Report Cyber Breaches and Incidents

June 26, 2024 at 05:56PM Optiv’s 2024 Threat and Risk Management Report, based on a Ponemon Institute survey, highlights a 59% spike in cyber budgets. The report emphasizes the urgency for organizations to prioritize cybersecurity investments, as data breaches and security incidents continue to rise. Key findings include security tool overload, top investment areas, lack … Read more

Palo Alto Networks Teams Up With IBM, Acquires QRadar SaaS Assets 

May 16, 2024 at 07:10AM Palo Alto Networks and IBM announced a partnership to provide cybersecurity solutions and consulting services. IBM will expand its use of Palo Alto’s security platforms and train security consultants. IBM Consulting will be a preferred MSSP for Palo Alto customers, and the companies will set up a joint SOC and … Read more

It’s Time to Rethink Third-Party Risk Assessment

February 12, 2024 at 10:06AM Regularly re-evaluating third-party risk assessments enhances security and prevents potential headline-grabbing incidents for your company. The key takeaway from the meeting notes is that continuously evaluating and updating third-party risk assessment is crucial for improving security posture and avoiding headline-making incidents for the company. Full Article

GenAI Requires New, Intelligent Defenses

November 21, 2023 at 09:57AM Jailbreaking and prompt injection pose rising threats to generative AI (GenAI), tricking the AI with specific prompts or concealing malicious data. GenAI models used in coding can have security vulnerabilities. Training AI on sensitive data can risk exposure. Traditional security approaches are inadequate. Two potential defense approaches are blackbox defense … Read more