Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Destroying the Barrier to Sophisticated Detection and Response Dan Brett, Chief Product Officer and Richard Barrell, Head of Product Management Your security infrastructure is under attack. And your SOC team is drowning in alerts from the entire security stack. Something is broken—and that’s w... 4 weeks ago | 49 mins Taking Insider Risk Management to the Next Level Shunta Sharod Sanders Insider threats can hang out in your network for months undetected, with the cost for mitigation rising exponentially. In fact, on average, incidents ... 3 months ago | 21 mins Top 4 Trends for the SOC Sanjay Raja, VP Product Marketing and Solutions, Gurucul The SOC is in a never-ending race to collect and analyze data to make better decisions. Many factors can positively or negatively impact their success... 45 mins ago | 31 mins Ransomware Protection: Across the Attack Surface and Along the Kill Chain David Finger, VP Product Marketing, Fortinet; Aamir Lakhani, FortiGuard Labs, Fortinet For ransomware operators to successfully encrypt data they first need to deliver code to target devices. In order to find those devices, attackers rel... 2 days ago | 34 mins How to Enhance your Security Posture by Consolidating Vendors David Finger VP of Product & Solutions, Fortinet; Jon Speer Director of Product & Solutions, Fortinet More than half of organizations (52%) believe security operations are more difficult today than in years past. And with good reason: The evolving thre... 1 week ago | 51 mins The SOC Analyst Experience: Tools and Techniques to Enhance Performance Featured guest from Forrester, Allie Mellen, and LogRhythm Threat Research Engineer, Sally Vincent Security operations center (SOC) analysts are on the frontline of defending against adversaries who are constantly trying to hack sensitive data and i... 1 week ago | 55 mins CISO's Roadmap to Cloud Security: Tackling Threats with Innovative Strategies Nesh (Steven Puddephatt) - Senior Solutions Engineer & Francesco Altomare - Southern Europe Regional Manager @ GlobalDots Today's CISOs face a daunting array of security threats. From ransomware and cloud misconfigurations to zero-day exploits and code vulnerabilities, th... June 15, 2023 12:00pm Effective Hybrid Multi-Cloud Monitoring for the SOC Sanjay Raja, VP Product Marketing and Solutions, Gurucul Current SIEM solutions have numerous challenges supporting the needs of security operations teams as organizations continue to move and more of their ... June 28, 2023 6:00pm People, Process & Partners: Building a Future-Ready Security Monitoring Strategy Jake Anthony, Senior Enterprise Sales Engineer at LogRhythm Cybercrime is rapidly increasing every year, with ransomware attacks taking place every 11 seconds by 2022, according to Cybersecurity Ventures. O... 1 week ago | 39 mins Data Security Questions E5: How Do I Use Data Context for Post-Breach Response? Andy Singer & Ash Nuckols The Open Raven team addresses how SOC analysts can use data context to accelerate post-breach response and containment actions. 3 weeks ago | 9 mins Load more