Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date TIP Functionality That Moves the Needle Mark Bermingham, Willy Leichter Threat intelligence is only valuable if your organization can ingest, process, enrich, correlate, prioritize, and take action based on these threat in... 3 hours ago | 46 mins The SOC Analyst Experience: Tools and Techniques to Enhance Performance Featured guest from Forrester, Allie Mellen, and LogRhythm Threat Research Engineer, Sally Vincent Security operations center (SOC) analysts are on the frontline of defending against adversaries who are constantly trying to hack sensitive data and i... 1 week ago | 55 mins How a Risk-based XDR Approach Improves Threat Detection and Response Jon Oltsik, Analyst and Fellow with Enterprise Strategy Group and Briana Farro, Director, XDR Product Management with Cisco Existing threat detection and response technologies are not as effective as they need to be for today’s security landscape. This unfortunate reality i... 1 week ago | 48 mins Hands-On with Nmap. A Guide to Network Scanning & Vulnerability Assessment Chris Greer - Packet Pioneer // cyberscope.netally.com // // Join and have a chance of winning a CyberScope // Want to learn more about network security and the tools used to pro... 2 weeks ago | 59 mins Modern SOAR and the Alphabet Soup of Cybersecurity Cody Cornell, Swimlane Co-Founer & Allie Mellen, Forrester Sr. Analyst and Special Guest Wading through a host of unstandardized cybersecurity acronyms like SIEM, SOAR, and XDR can be tough. In fact, frontline analysts and managers have ne... 2 weeks ago | 52 mins Data Security Questions E5: How Do I Use Data Context for Post-Breach Response? Andy Singer & Ash Nuckols The Open Raven team addresses how SOC analysts can use data context to accelerate post-breach response and containment actions. 3 weeks ago | 9 mins Protective DNS: Critical Capabilities for a Successful Implementation John Grady, Senior Analyst with Enterprise Strategy Group * Anthony James, Vice President of Product Marketing at Infoblox In this custom webinar session, John Grady, an experienced analyst at ESG, discusses the most pertinent, critical capabilities with which protective D... 1 month ago | 23 mins Building an Intelligence-Driven SOC Mark Bermingham, Willy Leichter Timely threat intelligence can be critical to proactively stop attacks before damage is done. But in many security teams, threat intel is handled by a... 2 months ago | 38 mins Innovation Showcase Ep.2: A standard approach to custom SOC Verizon The security industry knows a large number of terms that all describe managed SOC-based services: MSS, MDR, Managed SIEM, Advanced SOC, etc. Furthermo... 2 months ago | 39 mins Less Busywork. More Security: Top SecOps Use Cases CK Kee, Senior System Engineer Specialist, Cortex What does an ideal day in the SOC look like? It certainly wouldn’t include what you’re facing now with an endless stream of alerts, user requests and ... 2 months ago | 58 mins Load more