Focus Threat Intel Capabilities at Detection Engineering (Part 4)

Focus Threat Intel Capabilities at Detection Engineering (Part 4)

This blog series was written jointly with Amine Besson, Principal Cyber Engineer, Behemoth CyberDefence and one more anonymous collaborator.In this blog (#4 in the series), we will start to talk about the ...
Buyers Guide for AI Threat Detection and Response

Buyers Guide for AI Threat Detection and Response

In this buyers guide you'll learn about the many approaches to AI Threat detection and Response, what to look for, benefits, drawbacks, and everything you need to know when choosing an AI ...
[Darktrace + D3 Smart SOAR ] Automate, Detect & Respond

Why Smart SOAR is the Best SOAR for Darktrace

The need for integrated cybersecurity solutions has never been more pressing. With the growing complexity of cyber threats, having siloed security tools is no longer an option. This is where the synergy ...
IBM Killnet Google BlackBerry Zebra2014 start threat hunting

IBM Unfurls AI-Powered Managed Threat Detection and Response

IBM today added managed threat detection and response services that leverage artificial intelligence (AI) to identify and thwart cyberattacks ...
Security Boulevard
Nutanix Retrospect data encryption

Nutanix Simplifies Data Recovery to Thwart Ransomware Attacks

Nutanix extended an ability to detect threats that can be addressed by kicking off a recovery process that takes less than 20 minutes to execute ...
Security Boulevard
Build for Detection Engineering, and Alerting Will Improve (Part 3)

Build for Detection Engineering, and Alerting Will Improve (Part 3)

This blog series was written jointly with Amine Besson, Principal Cyber Engineer, Behemoth CyberDefence and one more anonymous collaborator.In this blog (#3 in the series), we will start to define and refine ...
Detection Engineering and SOC Scalability Challenges (Part 2)

Detection Engineering and SOC Scalability Challenges (Part 2)

This blog series was written jointly with Amine Besson, Principal Cyber Engineer, Behemoth CyberDefence and one more anonymous collaborator.This post is our second installment in the “Threats into Detections — The DNA of Detection ...
[AWS + D3 Smart SOAR] Unlocking Advanced Security Automation

Automated Incident Response with AWS and Smart SOAR

D3 Smart SOAR offers 12 out-of-the-box integrations with Amazon Web Services (AWS) products. These include: AWS CloudTrail AWS CloudWatch AWS EC2 AWS ECS AWS EKS AWS S3 AWS SQS AWS SSM AWS ...
Threat-informed or Threat-owned? Classic Practices Will Probably Save You!

Threat-informed or Threat-owned? Classic Practices Will Probably Save You!

So, if you are too busy to read our amazing (duh!) new blog “Revisiting Traditional Security Advice for Modern Threats”, here are the key ideas from it.At some point, a “pre-owned” (compromised before ...
What is SOAR (Security Orchestration, Automation and Response)? Explained by a SecOps Professional

XDR vs. SIEM vs. SOAR: A Vendor-Agnostic Perspective

For modern SOC teams, detection and response is a big data problem. Effective cyber defense hinges on collecting, analyzing, and acting on massive troves of security-relevant data. This is where tools like ...