Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Five SOC Modernisation Stories: How Splunk customers have elevated their SOC Kirsty Paine, Ana Arruda, Le-Khanh Au, Lars Wittich, Drew Gibson, and Matthias Maier On average, organisations have more than 30 security solutions in place and continue to evaluate, acquire and implement more. Each solution produces a... July 12, 2022 12:00pm Log4j and Beyond: How to Survive Open Source Zero-Days Shandra Gemmiti, Synopsys and Mike McGuire, Synopsys Whether you’re fighting a fire or mitigating a zero-day open source vulnerability, the response is important but it’s not the only factor. How you pre... 3 months ago | 37 mins Operationalizing Third Party Cyber Risk Management Ewen O'Brien, Senior Vice President, Cyber Third Party Risk, BlueVoyant When it comes to keeping up with an organization’s critical threats, it’s important to have visibility into your third parties. Traditionally, organiz... 1 month ago | 33 mins Innovation Showcase Ep.4: Risk-Based Vulnerability Remediation Strategy Chris Goettl (Ivanti), Dennis Merenguelli (Verizon), Richard Stein (Verizon) Continuous vulnerability management is an ongoing challenge. 2021 saw an increasing number of vulnerabilities to resolve (including an abundance of ze... 4 days ago | 38 mins Building Your Threat Detection and Response Strategy Melinda Marks, Senior Analyst, ESG | Oliver Rochford, Applied Research Director, Securonix The financial and reputational costs of a data breach can have profound and lasting effects. So, it’s imperative that businesses continually assess th... 5 days ago | 23 mins CISO Guide to Future-Proofing Your SOC Jeffrey Gardner, Practice Advisor Detection and Response, Rapid7 Given the current cyber threat landscape, your in-scope attack surface extends way beyond your organizational perimeter to cloud services, IoT devices... 4 days ago | 7 mins A Global SOC Never Sleeps: Advice on How to Build and Manage Yours Jeremiah Dewey, VP, Managed Services Delivery Practice / Warwick Webb, Senior Director, Detection & Response Services, Rapid7 While every organization currently deals with security incidents in some way, most organizations struggle under the weight of alert fatigue, lack of v... 4 days ago | 30 mins What Hijacked Robots Tell Us About IoT Risks in Healthcare Chad Holmes, Asher Brass, Daniel Brody On April 12th a set of five vulnerabilities impacting Aethon TUG healthcare robots were disclosed by Cynerio. These vulnerabilities allowed researcher... 4 days ago | 62 mins Is the security team the bottleneck to remediation? Yaron Levi, Dolby, Ian Amit, Rapid7, David Cross, Oracle Saas Cloud, Elad Yoran, Seemplicity, and Ravid Circus, Seemplicity Even with the best security people deploying the best security scanners, businesses today experience stubbornly long time-to-remediation. Why? The re... 6 days ago | 47 mins Innovation Showcase Ep.4: Risk-Based Vulnerability Remediation Strategy Chris Goettl (Ivanti), Dennis Merenguelli (Verizon), Richard Stein (Verizon) Continuous vulnerability management is an ongoing challenge. 2021 saw an increasing number of vulnerabilities to resolve (including an abundance of ze... 2 weeks ago | 38 mins Load more