Articles

Orchestration for OT Systems – Is the Time Right?

My journey into OT security has led me to the question of can we safely operate automated security orchestration platforms in an OT environment or a converged OT/IT environment? I...

Learn How D3 Security’s SOAR Platform Transforms SOC Operations In This Interview With ActiveCyber.net

I have been saying for a while that security automation, orchestration, and response (SOAR) tools are key enablers for tranforming SOC operations. And these tools have matured from glorified python...

AI and Mod-Sim Tools Create Insight for Better Cyber Investing

My recent SOC Service Manager experience got me to thinking about cyber tool sprawl and the return on investment that my customer was getting for their cyber investment. There is...

Security Orchestration: Looking Forward

Next Generation Concepts for Security Orchestration Workflow automation tools [aka orchestrators] are at the top of many CxOs’ buy and tech refresh lists as a way to drive down operational...

Security Process Automation

Getting Proactive About User & System Management

Proactive with a Personal Touch I was talking with a friend lately about proactive security. She mentioned a “proactive” practice she employed several years ago as a staff member of...

automated orchestration cybersecurity

Automated Orchestration

Ramping up Your Security Operations Center You just found out that your network is permeated with malware, and has been for months. What do you do now? You can’t just...