• Gartner Market Guide for SOAR – Key Points by Phase, Part Two of Four: Triage

    To fully appreciate the key points in each phase, especially the second phase in this series, the “Triage” phase, it’s important to understand the context of where the SOAR platform typically sits in the overall enterprise information flow within a SOC. For the purposes of this blog series, we will focus on the Enterprise SOAR use case.

  • Gartner Market Guide for SOAR – Key Points by Phase, Part One of Four: Detect

    The Gartner term and acronym for leveraging digitized workflows for orchestration and automation across a diverse set of IT and Security tools for executing Security Operations processes – securing the Software Development Lifecycle (SDLC), to Threat Intelligence synthesis and hunting to Alert triage, investigation and response – known as Security Orchestration, Automation & Response (SOAR) – has crystallized into the cyber world lexicon.

  • The Evolution of Security Automation

    This moderated panel will explore the evolution and future of security automation as it continues to mature and become more widely adopted by modern digital enterprises. Topics covered will include applications of machine learning that accelerate positive security outcomes, the adoption and utility of risk-based decision models in the real world, the relevance of event-driven solutions for security automation to overarching modern digital transformation, and applicability of knowledge management to security automation’s future.

    – JP Bourget, Founder and Chief Security Officer, Syncurity

    – Adam Vincent, CEO and Co-Founder, ThreatConnect
    – Bruce Potter, Chief Information Security Officer, Expel
    – Kim Watson, IACD Technical Director, JHU/APL

  • ServiceNow SOAR Integrations Now Available

    As the SOAR market shifts from early adopters to the early majority, a familiar trend toward ease of use has emerged that’s reminiscent of the enterprise server market two decades ago.

  • 3 Scariest Things About Your Security Program

    Halloween is a uniquely American tradition of scary movies, costumes, parties and of course, the candy-crazed-trick-or-treaters. While you binge watch the new Netflix series, “The Haunting of Hill House,” and answer the doorbell to hand out handfuls of sugar-infused treats, it might be worth thinking about the really scary risks lurking in your Security Program.

  • Three Reasons SOAR is Needed to Secure Healthcare IoT Medical Devices

    In his published research, “Evolving IoT Security Risks Demand New Approaches from Healthcare Delivery Organizations,” ID G00355342, Gartner Analyst, Gregg Pessin, provides key insights into the profound impact Internet of Things (IoT) medical devices have on security along with recommendations to address the growing risk.

  • How Security Automation Can Reduce Patch Management Cycle Time And Risk

    Ask any Security or IT professional and they will tell you that patch management is a never-ending process of identifying and remediating ongoing vulnerabilities that often lead to security breaches. Spectre and Meltdown are prime examples of recent vulnerabilities that have severely impacted the Healthcare industry,