Let AI Handle the Heavy Lifting in the Modern SOC
This post is also available in: 简体中文 (Chinese (Simplified)) 繁體中文 (Chinese (Traditional)) 日本語 (Japanese) 한국어 (Korean) {{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider...
View ArticleWitnessing a Revolution in Cybersecurity with AI
This post is also available in: 简体中文 (Chinese (Simplified)) 繁體中文 (Chinese (Traditional)) 日本語 (Japanese) 한국어 (Korean) {{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider...
View ArticleAI, Cybersecurity and the Rise of Large Language Models
This post is also available in: 简体中文 (Chinese (Simplified)) 繁體中文 (Chinese (Traditional)) 日本語 (Japanese) 한국어 (Korean)Artificial intelligence (AI) plays a crucial role in both defending against and...
View ArticleOn Credible and Cyber-Contextual Labeling
This post is also available in: 简体中文 (Chinese (Simplified)) 繁體中文 (Chinese (Traditional)) 日本語 (Japanese) 한국어 (Korean)Background Machine learning (ML) powered methods are rapidly taking over the...
View ArticleThe Power of AI Assistants and Advanced Threat Detection
This post is also available in: 简体中文 (Chinese (Simplified)) 繁體中文 (Chinese (Traditional)) 日本語 (Japanese) 한국어 (Korean)Smarter Security {{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s...
View ArticlePlaybook of the Week: Streamlining Suspicious Data Upload Alert Investigations
This post is also available in: 简体中文 (Chinese (Simplified)) 繁體中文 (Chinese (Traditional)) 日本語 (Japanese) 한국어 (Korean)Manual Investigations: The Struggle Is Real Data exfiltration refers to the...
View ArticlePlaybook of the Week: Prisma Cloud Compute - Compliance Alert v2
This post is also available in: 简体中文 (Chinese (Simplified)) 繁體中文 (Chinese (Traditional)) 日本語 (Japanese) 한국어 (Korean)Enhancing Compliance Alert Handling in Cortex XSOAR Maintaining compliance with...
View ArticleWhat’s Next in Cortex — XSIAM for Cloud and Other Innovations
This post is also available in: 简体中文 (Chinese (Simplified)) 繁體中文 (Chinese (Traditional)) 日本語 (Japanese) 한국어 (Korean)Tackling Diverse SecOps Challenges Simultaneously Security operations teams are...
View ArticleXSOAR 8 On-Premises Now Available!
This post is also available in: 简体中文 (Chinese (Simplified)) 繁體中文 (Chinese (Traditional)) 日本語 (Japanese) 한국어 (Korean)We are pleased to announce the support for on-premises deployments for XSOAR 8. New...
View ArticleConfirm Attack Surface Vulnerabilities with Cortex Xpanse Attack Surface Testing
This post is also available in: 简体中文 (Chinese (Simplified)) 繁體中文 (Chinese (Traditional)) 日本語 (Japanese) 한국어 (Korean)As organizations’ attack surfaces continue to grow, we’ve seen that traditional...
View ArticleLeading with a Prevention-First Approach for Cloud Detection and Response
This post is also available in: 简体中文 (Chinese (Simplified)) 繁體中文 (Chinese (Traditional)) 日本語 (Japanese) 한국어 (Korean)As cloud computing continues to evolve and becomes the ad-hoc standard for many of...
View ArticleAI's Offensive & Defensive Impacts
This post is also available in: 简体中文 (Chinese (Simplified)) 繁體中文 (Chinese (Traditional)) 日本語 (Japanese) 한국어 (Korean) {{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider...
View ArticleCortex Copilot - In SecOps, You Should Secure Smarter, Not Harder
This post is also available in: 简体中文 (Chinese (Simplified)) 繁體中文 (Chinese (Traditional)) 日本語 (Japanese) 한국어 (Korean)There are a lot of moving parts in security operations. As cyberthreats continue...
View ArticlePlaybook of the Week: Automating Response to Living-Off-the-Land (LOTL) Attacks
This post is also available in: 简体中文 (Chinese (Simplified)) 繁體中文 (Chinese (Traditional)) 日本語 (Japanese) 한국어 (Korean)Organizations face increasingly sophisticated cyberattacks in today's rapidly...
View ArticleSecuring Kubernetes Clusters: The Cortex XDR and XSIAM Approach
This post is also available in: 简体中文 (Chinese (Simplified)) 繁體中文 (Chinese (Traditional)) 日本語 (Japanese) 한국어 (Korean)Kubernetes has revolutionized the way we deploy and manage applications, but its...
View ArticleThe Dark Side of AI in Cybersecurity — AI-Generated Malware
This post is also available in: 简体中文 (Chinese (Simplified)) 繁體中文 (Chinese (Traditional)) 日本語 (Japanese) 한국어 (Korean) {{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider...
View ArticleProwling the Wilds — Upgrade Your SOC and Hunt Down Threats
This post is also available in: 简体中文 (Chinese (Simplified)) 繁體中文 (Chinese (Traditional)) 日本語 (Japanese) 한국어 (Korean)It would be nice to imagine our SOC analysts as the apex predators of the IT jungle,...
View ArticleAI in Cyber Is Here to Stay — How to Weather This Sea Change
This post is also available in: 简体中文 (Chinese (Simplified)) 繁體中文 (Chinese (Traditional)) 日本語 (Japanese) 한국어 (Korean) {{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider...
View ArticleCreating a Security Program with Less Complexity and More Visibility
This post is also available in: 简体中文 (Chinese (Simplified)) 繁體中文 (Chinese (Traditional)) 日本語 (Japanese) 한국어 (Korean)Developing a strong security program is like tending a garden. It takes a lot of...
View ArticleSmartGrouping - Precision AI™-Driven Investigation
This post is also available in: 简体中文 (Chinese (Simplified)) 繁體中文 (Chinese (Traditional)) 日本語 (Japanese) 한국어 (Korean)SmartGrouping is a crucial aspect of security operations, allowing to connect...
View Article