603 Results for:SOC
- Sort by:
Microsoft Copilot for Security brings GenAI to SOC teams
02 Apr 2024Microsoft's latest AI-powered tool, now generally available, has been beneficial for security teams regarding efficiency, but infosec experts see some room for improvements. Read More
SCC adds SOC to bolster security division
29 Feb 2024Channel player SCC views the addition of a security operations centre as a key part of attaining more growth Read More
Changes needed for SOCs and CSIRTs, claims Dutch research institute
04 Apr 2024Cyber security specialists need a game-changer to keep up with their adversaries, who increasingly use automation and AI for their attacks Read More
CERT vs. CSIRT vs. SOC: What's the difference?
17 Jan 2024What's in a name? Parse the true differences between a CERT, a CSIRT, a CIRT and a SOC, before you decide what's best for your organization. Read More
Top 6 SOAR use cases to implement in enterprise SOCs
17 Jan 2024Automating basic SOC workflows with SOAR can improve an organization's security posture. Explore six SOAR use cases to streamline SOC processes and augment human analysts. Read More
What is Managed SOC and why should you care?
03 Feb 2023Rowan Troy, senior security consultant at Littlefish shares his thoughts about the benefits of using a SOC Read More
The important role of SIEM in the SOC Triad
21 Feb 2023Sean Tickle, cyber services director at Littlefish, details why a SIEM is such an important element for the channel to understand Read More
Sophos soaks up SOC.OS
25 Apr 2022Sophos says acquisition of BAE spinout SOC.OS will enhance its managed threat and extended detection and response services Read More
How SOCs can identify the threat actors behind the threats
16 Sep 2022Learn how SOC teams can track threat actors by understanding the factors that influence an attack, such as the type of infrastructure used or commonly targeted victims. Read More
How EDR systems detect malicious activity
04 Dec 2023Endpoint detection and response tools help SOCs separate benign events from malicious activity. Learn how this EDR function works. Read More