Remove CISO Remove Data collection Remove Presentation Remove Threat Detection
article thumbnail

SOC Technology Failures?—?Do They Matter?

Anton on Security

Example SOC Troubles from some presentation :-) As we are working on the next SOC paper jointly with Deloitte ( paper 1 , paper 2 , paper 3 coming out really soon), we came across the need to review some of the current technology challenges in the SOC. like most CISOs, and then a new CISO comes in and tries it all over again.

article thumbnail

SOC Technology Failures?—?Do They Matter?

Security Boulevard

Example SOC Troubles from some presentation :-). A new CISO comes in, tries to champion the implementation of a new tool, the CISO is gone after a short amount of time?—?like like most CISOs, and then a new CISO comes in and tries it all over again. Data collection failures still plague many SOCs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CSTA Turns 400 – Proof That Technology Integrations Is Exactly What You Are Looking For

Cisco Security

The Cigent D3E integration with Cisco Secure Endpoint provides a highly effective automated response mechanism to threats detected on Windows 10 endpoints. Varonis is a pioneer in data security and analytics, specializing in software for data protection, threat detection and response, and compliance.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status McAfee Cybersecurity solutions 2021 Acquired: Intel Claroty Industrial cybersecurity 2020 Private Illusive Networks Threat detection and response 2020 Private Jask Autonomous SOC 2018 Acquired: Sumo Logic RiskSense Vulnerability management 2018 Acquired: Ivanti Phantom Cyber SOAR 2017 Acquired: Splunk.