Skip to Content

Tag: Security Automation

SOC Automation: How to Achieve The Modern SOC

An automated SOC is an essential line of defense in any organization, and a high-performing one requires streamlined security operations. Unfortunately, SOC analysts are often stuck in reactive mode due to the sheer volume of alerts they have to sift through using manual processes. And the amounts of data are only going to go up.   Current Automation […]

The State of SOC and Planning for 2023

Just like the threats we face, our industry is always changing and growing. That’s why I recently had the pleasure of hosting a webinar with my former Forrester Research colleague, Joseph Blankenship (or JB, as I like to call him), discussing “The Current State and Future Trends of Security Operations.” During the webinar, we had […]

New in GreyMatter: Better Security Automation with Intelligent Analysis

We’re constantly working to improve our offerings here at ReliaQuest, and today we’re excited to announce the launch of a new feature in GreyMatter, our Open XDR-based security operations platform. This feature, GreyMatter Intelligent Analysis, uses cutting-edge security automation technology to reduce or eliminate the manual aspects of the investigation lifecycle and process. Additionally, we’ve […]

Finding the Best Security Operations Platform

Security operations centers (SOCs) today are inundated with the myriad threats that have proliferated since the shift to remote work, the move to the cloud, and the decentralization of networks. The task of finding, sorting, and combating them all (with limited resources) can be daunting. That’s why many look to technology to help them bear […]

What Is Threat Hunting?

Originally published in August 2019 Every industry is susceptible to data breaches and malicious cyber-attacks. In 2021, over 5 billion records were exposed and over 1,200 data breaches occurred in the United States. With an 11% increase in data breaches compared to 2020, CISOs and security operations must actively monitor for threats and combat them before […]

Top findings of Forrester TEI report on ReliaQuest

The ultimate question when considering a big business purchase (or any purchase, really): Is this going to be worth the cost and effort? Recently, ReliaQuest commissioned a Forrester® Total Economic Impact™ (TEI) study to find out exactly what the financial and operational impact adopting the ReliaQuest Open-XDR-as-a-Service platform can have on a business. Using Forrester’s […]

Security Leaders in Europe Turn to Automation to Address Complexity: Survey

ReliaQuest, in partnership with the Information Security Media Group (ISMG), has released a survey of more than 200 cybersecurity professionals in Europe titled “2021 EMEA cybersecurity complexity study: How can you streamline your time to response?” The good news is: asked how they rate their organisation’s ability to respond quickly and effectively to today’s cybersecurity […]

Hybrid Intelligence Needed to Thwart AI-Powered Attacks

Just as defenders are leveraging AI elements such as machine learning and automation, adversaries are incorporating advanced techniques into their malicious activities. Hence the emergence of AI-powered attacks. Dubbed “one of the biggest fears within the security community” by Max Heinemeyer, Director of Threat Hunting at DarkTrace, AI-powered attacks leverage more offensive AI and less […]

How to Maximize ROI on UEBA Tools

What is UEBA? UEBA stands for “User and Entity Behavior Analytics” and can also be referred to as UBA, or “User Behavior Analytics.” Essentially, UEBA solutions look at patterns of human and machine behavior and then apply algorithms and statistical analysis to derive meaningful anomalies. Through these anomalies, the end goal is to provide an […]

Security Automation:  Let’s amplify, not replace people 

Security teams are plagued by two interrelated challenges – lack of resources and an ever-increasing set of tools that don’t speak the same language and require sophisticated skills to manage. Stories of analysts combing through disparate data, manually collating them to discover threats and many times, ending up with false positives, only to restart the […]