Arctic Wolf last week announced plans to buy SOAR platform provider Revelstoke in a move to boost Arctic Wolf's automated response capabilities and lay the groundwork for "deeply embedded" AI and machine learning. CEO Nick Schneider explained how the deal will benefit customers and drive innovation.
Summa Equity bought a majority stake in Logpoint to help the security operations firm expand in areas such as automation, detection and response, and attack surface management. The sustainable growth fund says the acquisition will allow the company to acquire technologies in adjacent areas.
According to the Forrester Wave issued in December 2022, the top challenge security analytics vendors face when bringing SIEM, SOAR and UEBA together is making it easy for customers to manage and maintain the offering, says Forrester analyst Allie Mellen.
The founding team behind SOAR vendor Demisto has started a passwordless authentication and user management platform company that caters to the developer community. Descope helps developers embed authentication in the application build process and competes with Auth0 in the CIAM space.
The latest edition of the ISMG Security Report analyzes why Meta has agreed to pay $725 million to settle a class-action lawsuit over users' personal data, how the median stock price dropped 40% among publicly traded security firms in 2022, and why an infrastructure change is needed in SOCs.
DevSecOps has been described as part strategy, part toolkit, part training and part cultural shift.
However, there’s no universal playbook on how to implement DevSecOps, and there can be conflict between DevOps prioritizing speed to market, functionality and revenue generation, versus SecOps striving to eliminate...
In this episode of "Cybersecurity Unplugged," Yonatan Khanashvili describes in detail how Golden Security Assertion Markup Language attacks occur and how SOC platforms with much greater capacity to cross-correlate data than legacy SIEMs can help defenders detect and hunt for them.
Devo has closed its Series F round and notched a $2 billion valuation to incorporate more capabilities into its SOC via acquisition. The company plans to use the $100 million to buy companies that will provide customers with additional intelligence on top of Devo's data for specific use cases.
Forrester analysts Allie Mellen and Jeff Pollard discuss their new research on the analyst experience, or AX. AX involves how security analysts perceive their interactions with security products, services and processes, and Mellen and Pollard say it can improve the SOC and security analyst workflow.
The latest edition of the ISMG Security Report describes new details emerging from the SolarWinds supply chain hack investigation. Also featured: A discussion of why security education is so crucial in 2021 and tips on how to retain security and operations center analysts.
Although some of the most prolific fraud sites exist on the clear web, the research captured in this report reveals numerous instances where data was leaked or
sold for the purposes of committing fraud.
Dark web vendors have thoroughly systematized the fraud trade. From basic to more sophisticated sites, hosts...
As of January 1, 2018, all SWIFT customers must self-attest to their compliance with the new SWIFT Customer Security Program (CSP). The program is designed to respond to the wave of cybercrime targeting SWIFT installations that began with the Bank of Bangladesh breach back in February 2016 and has swept across the...
There is no greater challenge for customer-facing organizations than finding the balance between security and convenience. In fact, 72% of consumers state that they have abandoned a transaction due to security concerns.
3D Secure 2.0 was designed to put the shopper's experience front and center. While the...
Card issuers continue to find themselves victims of ongoing attacks perpetrated by fraudsters looking to rapidly exploit any opening they can find in e-commerce transactions. Fraudsters often exploit cards from multiple issuers, which is why they are transitioning to a model that uses real-time device information from...
Too often card-issuing banks suffer significant losses from fraudsters stealing credit card credentials. Typically, these fraudsters use multiple cards from various issuers to complete purchases from a single device before the stolen cards can be blocked. The goal for banks is to immediately identify and stop these...