Keeping Your Organization Secure with Limited SOC Resources
Organizations face a growing threat from cybercriminals while struggling to find qualified security professionals who can protect their ..
Understanding Security Automation vs. Orchestration
“Automation” and “orchestration” are terms that frequently appear within the same sentence – which is unsurprising, because they ..
5 Questions to Ask When Developing an Automation Strategy
This post was previously published on The New Stack. Automation is like running a marathon. It sounds like a great and noble pursuit until ..
Automated Threat Intelligence Enrichment: An Overview
This post was previously published on The New Stack. Discovering security threats is good and well. But, in many cases, simply knowing ..
JSON Basics: Building Blocks for Workflow Automation
Automation workflows add a lot of value to an organization’s day-to-day operations. At a minimum, they streamline the execution of complex, ..
Automated Security Alert Remediation: A Closer Look
This post was previously published on The New Stack. In cloud-native organizations and software as a service (SaaS) businesses, cloud security ..
What Is CSPM? A Closer Look at Cloud Security Posture Management
As we previously discussed in the Automating Your Cloud Security Posture Management (CSPM) Response blog post, CSPM is a vital component ..
SOARs vs. No-Code Security Automation: The Case for Both
This post was previously published on The New Stack. Just a few years ago, security orchestration, automation and response (SOAR) was the new buzzword ..