603 Results for:SOC

  • Sort by: 

Microsoft Copilot for Security brings GenAI to SOC teams

By Arielle Waldman 02 Apr 2024

Microsoft's latest AI-powered tool, now generally available, has been beneficial for security teams regarding efficiency, but infosec experts see some room for improvements. Read More

SCC adds SOC to bolster security division

By Simon Quicke 29 Feb 2024

Channel player SCC views the addition of a security operations centre as a key part of attaining more growth Read More

Changes needed for SOCs and CSIRTs, claims Dutch research institute

04 Apr 2024

Cyber security specialists need a game-changer to keep up with their adversaries, who increasingly use automation and AI for their attacks Read More

CERT vs. CSIRT vs. SOC: What's the difference?

By Ed Moyle 17 Jan 2024

What's in a name? Parse the true differences between a CERT, a CSIRT, a CIRT and a SOC, before you decide what's best for your organization. Read More

Top 6 SOAR use cases to implement in enterprise SOCs

By Andrew Froehlich, Jessica Groopman 17 Jan 2024

Automating basic SOC workflows with SOAR can improve an organization's security posture. Explore six SOAR use cases to streamline SOC processes and augment human analysts. Read More

What is Managed SOC and why should you care?

03 Feb 2023

Rowan Troy, senior security consultant at Littlefish shares his thoughts about the benefits of using a SOC Read More

The important role of SIEM in the SOC Triad

21 Feb 2023

Sean Tickle, cyber services director at Littlefish, details why a SIEM is such an important element for the channel to understand Read More

Sophos soaks up SOC.OS

By Alex Scroxton 25 Apr 2022

Sophos says acquisition of BAE spinout SOC.OS will enhance its managed threat and extended detection and response services Read More

How SOCs can identify the threat actors behind the threats

16 Sep 2022

Learn how SOC teams can track threat actors by understanding the factors that influence an attack, such as the type of infrastructure used or commonly targeted victims. Read More

How EDR systems detect malicious activity

By Kyle Johnson, No Starch Press 04 Dec 2023

Endpoint detection and response tools help SOCs separate benign events from malicious activity. Learn how this EDR function works. Read More