What Is MITRE D3FEND, and How Do You Use It?
This post was previously published on The New Stack. MITRE is a world-renowned research organization that aims to help build a safer world. ..
When to Automate and When Not to Automate
Everyone loves automation, and it can be easy to assume that the more you automate, the better. Indeed, falling short of achieving fully ..
Keeping Your Organization Secure with Limited SOC Resources
Organizations face a growing threat from cybercriminals while struggling to find qualified security professionals who can protect their ..
Security Basics: Incident Response and Automation
Incident response is one of the most challenging tasks that IT teams face. It’s challenging not just because it typically involves many ..
Understanding Security Automation vs. Orchestration
“Automation” and “orchestration” are terms that frequently appear within the same sentence – which is unsurprising, because they ..
5 Questions to Ask When Developing an Automation Strategy
This post was previously published on The New Stack. Automation is like running a marathon. It sounds like a great and noble pursuit until ..
How Chatbot Automation Benefits Security Teams
This post was previously published on The New Stack. When you hear the term “chatbot,” your mind may at first turn to things like robotic ..
Automated Threat Intelligence Enrichment: An Overview
This post was previously published on The New Stack. Discovering security threats is good and well. But, in many cases, simply knowing ..
What Are Control Flow Statements?
Control flows are the backbone of automation. Identifying what to do with a set of data – and how – is a key component of high-value ..
An Introduction to Automation Basics
Automation is a powerful tool. With some foresight and a little elbow grease, you can save hours, days, or even months of work by strategically ..
JSON Basics: Building Blocks for Workflow Automation
Automation workflows add a lot of value to an organization’s day-to-day operations. At a minimum, they streamline the execution of complex, ..
4 Database Access-Control Methods to Automate
This post was previously published on The New Stack. Regardless of which role a person has in an organization, they will always need access ..
Automated Security Alert Remediation: A Closer Look
This post was previously published on The New Stack. In cloud-native organizations and software as a service (SaaS) businesses, cloud security ..
5 Ways Automated Incident Response Reduces Toil
This post was previously published on The New Stack. Toil — endless, exhausting work that yields little value in DevOps and site reliability ..
Automated Threat Hunting: A Closer Look
This post was previously published on The New Stack. Proactively finding and eliminating advanced threats through threat hunting is a growing ..
What Is Identity Lifecycle Management?
This post was previously published on The New Stack. If you help to manage cloud environments, you’re probably familiar with the concept ..
Seamlessly Secure Your Cloud Workloads
This post was previously published on The New Stack You’ve secured your cloud identities. You’ve hardened your cloud security posture. ..
Modern Security Operations Center Framework
This post was previously published on The New Stack. The Origins of Modern Cloud/IT Environments With agile development, the software development ..
What Is CSPM? A Closer Look at Cloud Security Posture Management
As we previously discussed in the Automating Your Cloud Security Posture Management (CSPM) Response blog post, CSPM is a vital component ..