Pages
Resources
- Under Pressure: Is Vulnerability Management Keeping Up?
- Swimlane to Unites the InComm Tech
- Are You Keeping Up with Vulnerability Management?
- Hot Takes: Cybersecurity Truths You Need to Hear for 2025
- The Role of Machine Learning in Cybersecurity
- Demystifying AI Agents: Fiction, Fantasy, or Future of SecOps?
- AI in Cybersecurity: 2025 is the year of “Put Up or Shut Up”
- This is a test page for Marketo Forms
- Life in the Swimlane with Nick Jones, Service Design Architect
- Extend Beyond SOAR: Step into the Future with AI Automation
- Meet the Swimlane Technical Account Management Experts
- Will AI Drive Efficiency and Budget Growth? Risks, Rewards & Reality
- Hot Takes: Cybersecurity Truths You Need to Hear for 2025
- Black Hat Europe 2024
- AI and the Workforce: Is it Overhyped or Essential?
- How Security Automation Tools Revolutionize Cybersecurity
- AI Security Governance Insights from Security Leaders
- How to Use Webhooks to Trigger Turbine Canvas Playbooks
- The Autonomous SOC: A Great North Star
- Swimlane Marketplace: The Foundation of an Automation Community
- Swimlane Security Blueprint: Corporate Security & Compliance Standards
- Life in the Swimlane with Dylan Dartnell, Professional Services Engineer
- Beyond SOAR’s Broken Promises: Unlock Next-Level Security with AI Automation
- How to Choose the Best Security Operations Platform: Key Considerations & Tips
- Generative AI SOC Analyst Platform Quadrant
- Generative AI-Powered Cybersecurity Vendor Landscape Quadrant Report
- Life in the Swimlane with Connor Mansfield, Senior SDR
- Cut Through the Noise: The Real Truth About XDR, SIEM, and the Future of SOAR
- Tips to Master Cybersecurity AI Prompt Engineering
- GDS’s Journey from SOAR to AI-Enhanced Security Automation
- 6 Steps for Automating Your Incident Response Plan
- Rummin’ With Rumsey Episode 4: AI Hype
- Automation: The Catalyst for Effective Threat Detection Engineering
- Swimlane Turbine Cloud-Native Architecture
- How is AI Used in Cybersecurity? 7 AI Use Cases
- AI Reality Check: CISO’s Unpack its Role in Cybersecurity
- SecTor 2024
- SecTor 2024
- How Security Automation Platforms Streamline SOC Operations
- Northland Power's Path to Automate 92% of Critical Vulnerabilities with Swimlane
- GDS Reveals Time-Saving Power with Swimlane AI and Automation
- Reality Check: Is AI Living Up to Its Cybersecurity Promises?
- Cut Through the Noise: The Real Truth About XDR, SIEM, and the Future of SOAR
- Life in the Swimlane with Abby Shapiro, Customer Success Manager
- Is AI Living Up to Its Cybersecurity Promises?
- How CyberWinter Studios Empowers Warfighters with Automation
- Improve and Optimize SOC Detections
- Rummin’ With Rumsey Episode 3: Cybersecurity Awareness Training
- Cracking the Code: How to Operationalise the Essential 8 Framework
- About Swimlane: Security Automation Built by Practitioners for Practitioners
- GDS Adds 20 Virtual Staff with Swimlane AI
- The AI Threat: Misinformation and the 2024 Elections
- The Role of SOC Playbooks in Modern Cybersecurity Strategies
- Cyber Security Summit Philadelphia 2024
- How Long Does it Take You to Successfully Identify Phishing Emails?
- AI Reality Check: CISO’s Unpack its Role in Cybersecurity
- How CyberWinter Studios Transforms Air Force Operations for Peak Efficiency
- Gartner Security & Risk Management Summit UK
- How to Improve Security Posture with Automation
- 5 Tips to Build an Automated SOC
- What is Network Security Automation?
- How CyberWinter Studios Saves the Air Force 400K Hours Monthly
- Turbine Dashboards Guided Tour
- Proven Tactics for Incident Response: A Hands-On Demo
- Rummin’ With Rumsey Episode 2: Physical Security
- 6 Tips to Simplify Security Automation Adoption
- Data Schema and the Rosetta Stone of the SOC
- Black Hat Customer Panel: Let's get real about where AI can help SecOps
- Cyber Security Summit Columbus 2024
- How fernao magellan Customized 140 Automation Use Cases
- Automate the Essential Eight
- How Swimlane Can Help SOC Management
- Maximize SOC Potential: Lessons from the 2024 SANS SOC Survey
- Proven Tactics for Incident Response: A Hands-On Demo
- How fernao magellan Automates over 100 Use Cases
- CyberRisk TV Interview: The Value of AI, Automation & Low-Code for MSSPs
- CyberRisk TV Interview: Let’s Get Real About Where AI can Help SecOps
- 8 Must-Ask Questions for AI Security Vendors
- Behind the Scenes at Black Hat 2024
- How AHEAD Enhanced SecOps Efficiency with Low-code Security Automation
- Analyze news of emerging threats with Hero AI
- Generate multilingual reporting with Hero AI
- Generate Knowledge Base articles with Hero AI
- Summarize alerts and recommend actions based on the MITRE ATT&CK framework with Hero AI
- AI-enhanced Automation Streamlines CISO Reporting
- Enhance cross-functional communication with Hero AI
- Analyze Phishing Emails with Hero AI
- How to Prepare for the Cyber Resilience Act
- Case Management
- Hero AI
- Maximize SOC Potential: Lessons from the 2024 SANS SOC Survey
- What is Cloud Security Automation? Why You Need it
- TAG Cyber Tech Report: Using AI for SecOps Automation
- How AHEAD Reduces Alerts by 30% with Swimlane
- Four Automated Anti-Phishing Techniques
- fernao magellan Saves 70% of Time with Swimlane Security Automation
- Cyber Security Summit DC Metro 2024
- Swimlane Turbine MSSP Pricing and Packaging
- Swimlane Turbine Enterprise Pricing and Packaging
- Staying Vigilant: Tackling Phishing with Security Automation
- The Impact of SEC Cyber Rules on Corporate Risk Management
- SANS Product Brief on SecOps with Swimlane
- Cyber Security Summit Raleigh 2024
- SANS 2024 SOC Survey: Facing Top Challenges in Security Operations
- SANS 2024 Security Operations Center Survey
- Mastering the Art of GRC Automation: Key Deliverables
- Cyber Threat Readiness Report
- Life in the Swimlane with Mark Bjerke, Regional Sales Director
- AHEAD Reduces Alerts by 30% with Swimlane Turbine
- Cyber Security Summit Pittsburgh 2024
- Staying Vigilant: Tackling Phishing with Automation
- Cyber Security Summit Hartford 2024
- Arcanna.ai & Swimlane Integration
- Five Signs You’re Using “Good Enough” Automation
- How New Cybersecurity Regulations Drive Strategy and Budget Increases
- Taming the Beast: How Effective Are Incident Disclosure Regulations?
- Will AI Take Over Cybersecurity Jobs?
- TAG Security Annual: Exploring Cutting-Edge Security Automation
- Regulations vs. Reality Video: Are the FED’s Incident Disclosure Rules Effective
- Cyber Security Summit Salt Lake City 2024
- The "Materiality" Mystery: A CISO's Guide to SEC Compliance
- Gartner Security & Risk Management Summit USA 2024
- Infosecurity Europe 2024
- Filling the Operational Technology (OT) Visibility Gap
- Life in the Swimlane with Emily Spector, Senior SDR
- AI, Cybersecurity and Compliance: A Data-Driven Perspective
- What is Security Orchestration?
- When to Automate and When Not to Automate Security
- Regulation vs. Reality: Are the Fed's Attempts at Wrangling Incident Disclosure Effective?
- Cyber Security Summit Denver 2024
- Understand Swimlane’s AI-enhanced Low-code Automation Platform at Unicon 2024
- Alleviate Your Security Talent and Staffing Challenges
- Are the Fed’s Attempts at Wrangling Incident Disclosure Effective?
- What is the State of Cybersecurity Today?
- Taming the Beast: How Effective Are Incident Disclosure Regulations?
- Questions You Need to Ask When Evaluating a Security Automation Vendor
- From Vision to Reality: A CISO’s Perspective on Cybersecurity Marketplaces
- Life in the Swimlane with Payal Mehrotra, VP of Product
- Inside RSA 2024: Triumphs and Tribulations of a First-Time Attendee
- RSAC 2024
- Alleviate Your Security Talent and Staffing Challenges
- Filling the OT Visibility Gap
- Streamline NIS2 Compliance with Automation
- Cyber Security Summit Milwaukee 2024
- Threat Intelligence & IOC Lookup Use Case
- Tips to Transform SecOps Communication for Faster Incident Resolution
- Life in the Swimlane with Bryon Page, Field Chief Technology Officer
- Black Hat Asia 2024
- Cyber Security Summit Waltham/Boston 2024
- Top Case Management Capabilities Every Analyst Needs
- SOC Automation: What is it and Why it Matters
- Quadrant Knowledge Solutions SPARK Matrix™: Security Orchestration, Automation and Response (SOAR), 2024
- Beyond Buzzwords: How automation transforms SecOps into a force multiplier
- Cyber Security Summit Dallas 2024
- What Security Metrics Should I Be Looking At?
- Cyber Security Summit Nashville 2024
- Cyber Security Summit Baltimore 2024
- Fortifying Your Security Operations with Modern SOAR
- Why Swimlane Should Be Your Next SOC Vendor
- Forum International de la Cybersécurité France
- Why “Good Enough” Automation is Never Enough
- Meet Turbine's Innovations
- Why OT Cybersecurity Needs a Low-Code Solution
- Life in the Swimlane with Lindsay Jones, Director of Service Operations
- Dragos & Swimlane Integration
- Gartner Security & Risk Management Summit ANZ
- Cyber Security Summit Miami
- Predicting A New Era for Cybersecurity in 2024
- Elevate Security Automation with Swimlane Turbine
- Cyber Security Summit Rosemont/Chicago 2024
- Protecting Critical Infrastructure with Low-code Security Automation
- How to Automate your Security Operations in 10 Mins or Less
- Future of Cybersecurity London
- Top Case Management Capabilities Every Analyst Needs
- Achieving Next Level DLP with Low-Code Security Automation
- Getting Started with Low-code Security Automation
- Linux Security that Actually Works with Vali Cyber and Swimlane
- How to Build a Modern Security Operations Center (SOC)
- Security Automation Report for Federal Agencies
- SOC Best Practices You Should Implement
- Watch: How Ideal Integrations Leverages Swimlane’s Security Automation
- Cyber Security Summit New York 2024
- Tips and Tricks for AI Threat Intelligence Automation
- Watch: Navigating the Phishing “Golden Hour” with Mimecast and Swimlane
- Unit 221B: Realizing Value in a Flash with Swimlane Security Automation
- Watch: Unit 221B: Realizing Value in a Flash with Swimlane Security Automation
- Watch: Elevating Service Provider Performance with Security Automation
- Cyber Security Summit Seattle 2024
- Watch: Security Automation and The Evolution of SOAR with IDC
- Security Automation and The Evolution of SOAR with IDC
- Watch: The ROI of Low-Code Security Automation
- The ROI of Low-Code Security Automation
- Watch: Protecting Cyber and Physical Systems with Low-Code Security Automation
- Protecting Cyber and Physical Systems with Low-Code Security Automation
- Watch: Predicting A New Era for Cybersecurity in 2024
- Watch: Meet Turbine’s Innovations
- Swimlane Leads the Security Orchestration Automation Response (SOAR) Data Quadrant
- Modern SOAR and the Alphabet Soup of Cybersecurity
- Watch: Modern SOAR and the Alphabet Soup of Cybersecurity
- When “Good Enough” Automation Leaves you with “Good Luck With That”
- Swimlane Turbine Overview
- Turbine Canvas
- The Important Role of Automation for MPLS in Networking
- Swimlane Hero AI
- Cybersecurity Summit Interview: The Value of Swimlane
- Automate Third Party Cyber Risk
- Swimlane and CYFIRMA
- Cyber Security Summit Silicon Valley 2024
- What is Threat Detection and Incident Response?
- Presentation de l'entreprise
- Future of Cybersecurity Manchester
- How AI Scripting Simplifies Automation
- How To Automate SIEM Alert Triage
- Life in the Swimlane with Chief Revenue Officer, Chris Hoff
- Cyber Security Summit Atlanta
- The Essential Role of Automation to Meet NIS2 Compliance
- Cyber Security Summit Tampa 2024
- Build a Case Management Playbook in 5 min with Turbine Canvas
- Hero AI Case Summarization and Crafted Prompts Demo
- Ignite the Future with Swimlane: Highlights from SKO 2024
- Meet Turbine Canvas and Embrace the Art of Powerful Simplicity
- The SecOps Triple Threat: Automation, AI and Low-code
- Autonomous Integrations: A New Perspective on Seamless Connectivity
- Life in the Swimlane with Principal Data Scientist, Dima Skorokhodov
- Cybersecurity 2024: Insights from Swimlane's C-Suite
- Roles & Responsibilities of a DevSecOps Engineer
- Life in the Swimlane with Kevin Mata, Director of Cloud Operations and Automation
- Why RV Connex Chose Swimlane for Automation
- Why RV Connex Chose Swimlane As “The Powerhouse” Of Their SOC
- RV Connex Chooses Swimlane As “The Powerhouse” Of Their SOC
- The Top Breaches of 2023: All You Need to Know
- Case Management for Phishing Triage Use Case
- Predictions from the Swimlane C-Suite: What You Need to Know About Cybersecurity in 2024
- How to Automate Phishing Detection and Response
- NOC vs SOC: What’s the Difference?
- Swimlane Accelerates Security Operations in India with New Strategic R&D Center
- Swimlane Turbine SOC Solutions Bundle
- Life in the Swimlane with Senior Customer Success Manager, Sylina Barwick
- The Power of IDPS: Enhancing Authentication & Security
- Safeguard Your Organization: How to Navigate the Surge in Fraud this Holiday Season
- What is a Whaling Attack in Cybersecurity?
- Your Modern SOC: The Value of Vectra AI and Swimlane
- Automation Journey with Phoenix Cyber
- Threat Detected: The Challenges of Financial Services
- 2023年のサイバー脅威対策レポートからの主要な調査結果と誤解
- What Automation has to do with AI and Cybersecurity
- Unveiling Security Automation: Executive Perception vs. on the Ground Reality
- How To Leverage Automation To Drive IT/OT Convergence
- Fraud Prevention for The Finance Industry: The Key to Success
- How Automation Supercharges Efficacy and Scale for MSSPs and MDRs
- The Great Bali Seaside Cybersecurity Chat
- How Ideal Integrations Leverages Swimlane’s Security Automation
- Unit 221B: Realizing Value in a Flash with Swimlane Security Automation
- Navigating the Phishing “Golden Hour” with Mimecast and Swimlane
- Empowering IT Teams with Low-Code Security Automation (Truth in IT)
- Life in the Swimlane with Director of International People Operations, Lakshmi Madegowda
- The State of Security for Finance: What You Need to Know
- State of Security for Financial Services
- The State of Security for the Finance Industry | Infographic
- Attack Surface Management: The Role it Plays in Cybersecurity
- Security Automation: A Strategic Imperative for Federal Agencies
- The No-Code Fantasy: What Football Strategy Can Teach Us About Decision Making
- The Value of Dataminr Pulse and Swimlane Turbine
- Dictionary Attacks: How They Decode Passwords
- An In-Depth Exploration of ARMOR Level 4: Automated Prevention
- Weedmaps Relies on Swimlane for Endless DevSecOps Automation
- MSSPS, Améliorez Votre Efficacité Grâce à l'Automatisation de la Sécurité
- Life in the Swimlane with Security Solution Architect, Joshua Roback
- What Tomatoes Teach us about Security Alerts
- Protéger les Infrastructures en Automatisant Votre Sécurité Avec du Low-Code
- No-Code Capabilities Cut Playbook Building in Half
- Life in the Swimlane with Product Designer, Vivian Lee
- A Deep Dive into ARMOR Level 3: Automated Response
- XDR vs SIEM vs SOAR: Choosing The Best Security Solution
- Hero AI Text-to-Code
- The Road to Excellence: Elevating Service Provider Performance with Security Automation
- Types of Cyber Security Attacks & How to Prevent Them
- Enriched Visibility: Understand Level 2 of the ARMOR Assessment
- Comment automatiser la réponse à incidents avec Elastic et Swimlane
- Life in the Swimlane with Content Marketing Manager, Maycie Belmore
- Unveiling Security Automation: Perception Vs. Reality
- Quadrant Knowledge Solutions Names Swimlane a Leader in the 2023 SPARK Matrix for SOAR
- What is ARMOR Foundational Visibility? Level 1 of The ARMOR Assessment Explained
- ARMOR Matrix
- 5 Essential Steps For Stronger Cloud Security Using MITRE ATT&CK And D3FEND
- Quadrant Knowledge Solutions SPARK Matrix™: Security Orchestration, Automation and Response (SOAR), 2023
- The Zero Trust Clock is Ticking: Are Your SecOps Teams Ready?
- Threat Detected: The Story of an Empowered CISO
- Swimlane and Recorded Future
- Swimlane and Vectra AI Platform
- The Future of SOAR
- Toshiba Case Study Video
- Toshiba Automates, Centralizes, and Streamlines
Security Operations by Deploying a Modern SOAR
- Life in the Swimlane with Senior Marketing Program Manager, James Therrien
- What Is Hyperautomation? What It Means For Security Teams.
- Discovering Your Cybersecurity ARMOR: Do You Have What It Takes?
- Cyber Threat Readiness: Should We Sound The Alarms?
- The Swimlane ARMOR Framework
- Introducing the Swimlane ARMOR Assessment
- Key Findings and Misconceptions from the Cyber Threat Readiness Report
- SEC Proposes Cybersecurity Rules
- Why Weedmaps Chose Swimlane for DevSecOps Automation
- The Impact of Culture & Morale on Security ROI
- Weedmaps Unlocks Endless DevSecOps Automations with Swimlane
- Life in the Swimlane with Head of GRC, Jack Rumsey
- The Impact of Culture & Morale on Security ROI
- Swimlane and AWS Security Lake
- Unit 221B: Realizing Value in a Flash with Swimlane Security Automation
- How MSSPs Can Leverage Security Automation
- The Top Challenges for MSSPs
- Toshiba Case Study Video
- Toshiba Corporation - Customer Case Study - 日本語
- The Benefits of Security Automation for MSSPs
- Threat Detected: The Challenges of an MSSP
- Value-Based Pricing for MSSPs
- Cloud-Native Automation Architecture
- Life in the Swimlane with Technical Writer, Lee Griffin
- Top 13 Automation Use Cases for Your SOC and Beyond
- What is Incident Response? Plans, Policy, Tools & Examples
- What is Data Loss Prevention (DLP)? And How Low-Code Security Automation Can Help
- 4 Low-Code Security Automation Benefits For Your SecOps
- Empowering Security Operations in Japan: Swimlane's New Tokyo Office
- Low-Code Security Automation: Everything You Need to Know
- How to Maximize Your Security Automation Investment
- Security Automation: Five Things You Should Consider
- The Three Scariest Breach Consequences for CISOs
- ChatGPT is a Security Risk, But We’ll Still Use it.
- Automated Malware Analysis with Low-Code Security Automation
- Swimlane and AWS: Accelerating Incident Response with Automation
- How to Leverage Open Source Threat Intel Against Cobalt Strike Attacks
- Swimlane & Phoenix Cyber, Partnering to Deliver Custom SOAR Use Cases
- SOAR Use Case: Automated Malware Analysis
- Automation and Intelligence: Key Ingredients for Modern Security Strategy
- Fortifying Your Security Operations Modern Solutions for SOAR
- Life in the Swimlane with Senior SDR, Matthew Bilsland
- MSSP Automates Incident Response with AWS & Swimlane
- Swimlane and Kount: Fraud Prevention, Risk Management and Big Banking Thresholds
- Swimlane CSO & Co-Founder, Cody Cornell, Recognized as a 2023 Colorado Titan 100
- The Next Great Resignation? Security Leaders & CISOs.
- The Game Changer for Cybersecurity Challenges in META
- Where's the SOAR Magic Quadrant?
- Life in the Swimlane with Software Engineer, Pablo Araya
- XCION 10TH CONFERENCE
- Here’s What a SOAR Platform’s Case Management Should Include
- 451 Research: Security Operations Market Insight Report
- The Past, Present and Future of Security Orchestration, Automation and Response
- Fortifying Your Security Operations with Modern SOAR
- Replay past present future of soar - TEST
- Overcoming the cybersecurity skills shortage
- Gartner: SOC Model Guide
- Energy Company Ensures Compliance with Swimlane and 1898 & Co.
- Gartner: SOC Model Guide
- A Buyer's Guide for Modern Security Automation
- A Day In the Life with Senior Product Manager, Joy Bishop
- U.S. Government Agency Improves SecOps with Swimlane
- MSSP Selects Swimlane for Flexibility and Scalability
- InComm Payments Unifies Security Tools with Swimlane
- Energy Infrastructure Optimizes Security with Swimlane Automation
- Softcat Overcomes the Cybersecurity Labor Shortage with Swimlane
- ProCircular Unlocks Power and Flexibility with Swimlane
- What is Security Orchestration?
- The DIG Transforms Phishing Defense with Swimlane
- Top Four Causes of Unsustainable Security Operations
- The Top Cybersecurity Frameworks You Should Know
- Five Incident Response Metrics you Should be Recording
- Why InComm Payments Chose Swimlane to Unite Its Tech Stack
- The Key SOC Team Roles and Responsibilities
- 2022 Wrap-Up: A Winning Year for Swimlane
- Everything You Need to Know About Automating DFIR
- What is SOAR? A Complete Guide to SOAR Platforms
- Warning Signs of Security Analyst Burnout & Ways to Reduce it.
- Automating Threat Intelligence Enrichment
- What is a Security Operations Center (SOC)? SOC Guide
- Swimlane Turbine + Elastic
- 11 Questions to Ask When Evaluating a SOAR Platform
- A Security Guide to TDIR: Threat Detection and Incident Response
- Swimlane and CrowdStrike: Enabling Collaboration and Automation to Reduce MTTR
- Swimlane Turbine Named Best SOAR Solution in 'ASTORS' Homeland Security Awards
- 5 Threats to Your Enterprise Mobile Device Security and How to Prevent Them
- The Past, Present and Future of Security Orchestration, Automation and Response
- What it’s Like to be an Engineer at Swimlane
- The Top SOC Analyst Challenges
- IT and OT Automation – The Art of the Possible
- Nozomi Networks & Swimlane
- Swimlane and Nozomi Networks, Vulnerability Management Automation for Critical Infrastructure
- Vulnerability Management Automation: Here’s Why You Need it
- The Top Data Breaches of 2022 so far
- 2022 Modern SOAR Buyer's Guide
- Why Low-Code Security Automation
- The Reality of Security Automation ROI: Calculations & Considerations
- Return on Investment (ROI) Analysis of Swimlane Security Automation
- Automated Incident Response: Everything You Need to Know
- Guide to Insider Threats: Definition, Detection, Best Practices & Tools
- Swimlane Earns 2022 Tech Cares Award From TrustRadius
- Mimecast + Swimlane Joint Solution Brief
- A Deep Dive into the 0ktapus Phishing Attacks
- Don’t Take the Bait: Automated Phishing Investigation and Response
- Swimlane Turbine + Dataminr Pulse Integration Demo
- Swimlane and Dataminr Pulse, Automated Response for Real-time Remediation
- Life in the Swimlane with Sales Development Manager, Neal Belshoff
- What is Cyber Threat Hunting? Methods, Tools, and Tips
- Managing Security Alerts with an Incident Response Platform
- Ten Hard-hitting Cybersecurity Statistics for 2022
- The Rise of Mobile Phishing and How to Prevent Mobile Phishing
- Technical Account Manager Service
- Swimlane Cloud Migration
- Gartner: 2022 Market Guide for Security Orchestration, Automation and Response Solutions
- Why The DIG Chose Swimlane to Transform Its Phishing Defense
- Why You Need to Automate Your Onboarding & Offboarding Process
- Building a Defense Against Cybersecurity Fraud and Brand Impersonation
- The Importance of SOC 2 Type II Compliance
- How to Build an Incident Response Playbook
- Top 3 Benefits of Low-Code Security Automation Playbooks
- Life in the Swimlane with Quality Analyst, Jorge Montero
- Webhooks Explained: What Are Webhooks? How Do They Work?
- What is Security Automation? The Ultimate Guide
- 4 Ways to Improve Integrations for Better Security Performance
- Life in the Swimlane with Technical Alliances Manager, Greg Sherman
- Why Security Automation is the Future of SOAR
- ProCircular Turns to Swimlane as the Brain for Security Automation and Orchestration (2:26)
- A Day In the Life with Tier 3 SOC Analyst, Vin Munk
- ProCircular Maximizes Security Operations with Flexible Low-Code Automation
- A Day In the Life with Software Developer Team Lead, Nelson Gutierrez
- How to Respond to Threats Faster with Active Sensing Fabric
- A Day In the Life with Product Manager, Melissa Espinal
- A System of Record for Security: Everything You Need to Know
- Swimlane Report by 451 Research
- How AI Automation Maximizes Security ROI – Smart Cybersecurity Budget Strategies
- Meet Swimlane Turbine, The Future of Security Automation
- The Force Multiplier for XDR
- Introducing Swimlane Turbine
- QuickStart Demo Video
- Power & Flexibility: Two Major Benefits of Low-Code Security Automation
- 6 Things to Consider Before Automating Your Security Processes
- A Day In the Life with Regional Sales Director, Ed Sawkins
- Why NTT DATA Chose Swimlane for Security Automation
- A Day In the Life with Product Designer, Madeline Horvath
- Softcat Selects Swimlane as Hub for Managed Cybersecurity Services (3:35)
- Swimlane Support Overview
- A Day In the Life with Office Manager, Xiaomei Grier
- Swimlane Awarded Gold Medal in the 2022 SOAR Data Quadrant Report
- A Day In the Life with Sr. Security Solutions Architect, Josh Rickard
- Fraud Case Management: What It Is, How It Works, & Why You Need It
- A Day In the Life with Sr. Product Designer, Kate Hasz
- Gartner: 2022 Market Guide for Security Orchestration, Automation and Response Solutions
- Outside of the SOC: Use Cases not to Underestimate
- A Day In the Life with Engineering Manager, Tyler McClure
- Does Automation Remove the Need for People? The Security Automation Oxymoron
- A Day In the Life with Senior Product Manager, Christopher Fox
- A Day In the Life with Organizational Development Director, Kelly Dougherty
- Low-Code vs. No-Code Security Automation: What’s the Difference?
- Top Low-code Security Automation Use Cases
- Automating Attack Testing with SOAR and Atomic Red Team
- Swimlane Partners with CyberSecurity Malaysia to Address the Global Cybersecurity Skills Gap
- 1898 & Co. and Swimlane Partner to Secure the Future of Critical Infrastructure
- Swimlane Security Automation Company Overview
- Unexpected Low-Code Security Automation Use Cases
- How to Build a System of Record with Low-Code Security Automation
- A Day In the Life with Product Marketing Director, Katie Bykowski
- The Most Common SOAR Use Cases
- Top Low-Code Security Automation Use Cases
- The Benefits of SOAR for your SOC Team
- Harness of the power of industry low-code security-automation best practices
- 11 time saving tricks to try with Swimlane ChatBot for Slack
- Executive Order Issued for Security Orchestration, Automation and Response (SOAR)
- Low-Code Security Automation Report
- Softcat Realizes 30% Business Growth Powered by Low-Code Security Automation (Video)
- The Swimlane Automation Platform Then, Now, and a Hint of What’s Next
- How to Automate Response to Credential Compromises
- Fortune 500 Financial Service Company Leverages Swimlane’s Low-Code Security Automation to Solve Cross-Departmental Security Use Cases
- Automation and Intelligence: Key Ingredients for Modern Security Strategies
- Google Acquires Siemplify: Smart Money Bets on Security Automation
- SOAR vs SIEM: Security Solutions Differences Explained
- Atomic Red Team Testing With Swimlane
- Incident Response Use Case (3:44)
- Integrating Swimlane and VirusTotal (3:01)
- Swimlane Becomes Fastest Growing SOAR Company with 700%+ Revenue Growth in Less Than Four Years
- Automating Incident Response Playbooks with Low-Code Security Automation
- Swimlane and Dataminr Pulse JSB
- Swimlane Cloud
- Integration Spotlight: Recorded Future Identity Intelligence Module
- Cybersecurity Beyond Black Friday: Retail Security Automation Use Case
- Understanding High-Impact, Low-Code Security Automation
- Swimlane Partnership Brings Low-Code Automation to VMware EDR
- Building Best-of-Both-Worlds Automation and Threat Intel With Swimlane and VirusTotal - Part Two
- Building Best-of-Both-Worlds Automation and Threat Intel With Swimlane and VirusTotal - Part One
- Low Code Security Automation with Swimlane at Field Security Day 6
- Retail Security Use Case (8:39)
- Low-Code Security Automation Makes Its Debut
- Swimlane Wins Cybersecurity Breakthrough Award for ‘Overall SOAR Platform of the Year’
- Swimlane named to Colorado Startup's fastest growing leaderboard
- The Security Automation Train is Coming Fast - Will you be on board?
- Swimlane Senior Engineer, Chau Tran, Named Google Developers Expert
- Hear From Your Peers: How One Organisation Embraced Automation in Their Cyber Resiliency Journey
- Hear From Your Peers: How One Organisation Embraced Automation in Their Cyber Resiliency Journey
- Recorded Future and Swimlane Deliver Intelligent Security Automation
- Why You Need a True SOAR Solution for Your Business Needs, Not Just SecOps
- Swimlane Named Most Innovative Security Investigation Platform in 2021 CDM Global Infosec Awards
- Continually Decrease Cyber Risks with Vulnerability Management and Security Automation
- Elastic and Swimlane partner to deliver an extensible framework for the modern SOC
- Continually Decrease Cyber Risks with Vulnerability Management and Security Automation
- Integrating Netskope and Swimlane (2:19)
- Common REST API Authentication Methods Explained
- The Pitfalls of Choosing a “Good Enough” SOAR Solution
- Integrating Venafi Trust Protection Platform and Swimlane (2:45)
- SOAR Use Case: Insider Threats
- Swimlane Demo - Automating Triage of SIEM Alerts
- Unexpected Low-Code Security Automation Use Cases
- Swimlane Platform Demonstration
- Integrating CrowdStrike Falcon and Swimlane (2:36)
- Achieving Public-Private Coordination and Collaboration on a National Scale
- Physical Security Monitoring and Response (5:49)
- Swimlane and AWS
- How Do We Measure The New Administration’s Success in Cybersecurity?
- Swimlane Demonstration - Automating Triage of SIEM Alerts
- SOAR Use Case: Insider Threats
- Ask Not What Union Types Can Do For You; Ask What You Can Do to Union Types
- Meeting Executive Order M-21-31 for Security Orchestration, Automation and Response
- Phishing Use Case Demonstration
- Your First SOAR Use Case: Phishing Triage
- Introducing James Brear, Our New CEO
- Swimlane Platform Demonstration
- Reducing Response Times with SOAR-Integrated Threat Intelligence
- What to Look For in a Threat Intelligence Solution
- Swimlane and Claroty
- Close It Down - Automated Security with McAfee & Swimlane
- Close It Down - Automated Security with McAfee & Swimlane
- Swimlane and Attivo Networks Solution Brief
- How SOAR Can Revolutionize Fraud Detection and Investigation
- Using SOAR to Automate ATT&CK Testing
- Automating NERC-CIP Incident Response and Reporting Demo (7:33)
- Swimlane Releases elk-tls-docker to Simplify the Testing and Deployment of Elastic Stack
- Swimlane & Pareto Cyber: Advantages of SOAR-as-a-Service
- Swimlane Trial Launches with McAfee's MVISION Marketplace Opening
- Swimlane and McAfee MVISION Solution Brief
- How SOAR Makes Threat Detection and Remediation More Effective
- Swimlane and Stellar Cyber
- Improving Incident Response with SOAR with Swimlane and Tenable
- Hazards to Avoid When Implementing SOAR
- SOAR Faster and Smoother with Swimlane 10.2
- How to Reduce Response Times with SOAR-Integrated Threat Intelligence
- How to Reduce Response Times with SOAR-Integrated Threat Intelligence
- Key Takeaways for SOAR Solutions
- Understanding Data Privacy Regulation in the US and how SOAR can Help
- Arming your Security Operations Center with SOAR
- Streamline Your OT Security Operations Center with SOAR
- Streamline your OT Security Operations Center with SOAR (52:19)
- Staying ahead of pandemic-related cybersecurity threats with automation
- How Automation and Orchestration can Help Bridge the IT Security Skills Gap
- Swimlane and IRONSCALES
- Getting Started with DFIR for the Cloud
- Lost Laptop Triage (5:11)
- How to Detect and Eliminate Cloud Attacks with Swimlane and Vectra
- Automating Digital Forensics and Incident Response (DFIR) Plans (2:40)
- The Digital Forensics and Incident Response (DFIR) Lessons Learned Phase (3:27)
- The Digital Forensics and Incident Response (DFIR) Recovery Phase (1:38)
- The Digital Forensics and Incident Response (DFIR) Eradication Phase (1:31)
- The Digital Forensics and Incident Response (DFIR) Containment Phase (1:43)
- The Digital Forensics and Incident Response (DFIR) Detection Phase (3:54)
- The Digital Forensics and Incident Response (DFIR) Preparation Phase (2:09)
- The Digital Forensics and Incident Response (DFIR) Plan (1:19)
- What is Digital Forensics and Incident Response (DFIR) and Why Do I Care? (1:49)
- Understanding the Fundamental Rights of the Data Subject and establishing your Data Privacy Program with SOAR
- Streamlining Incident Response & Reporting Requirements in Compliance
- Streamlining Incident Response and Reporting Requirements in Compliance (46:15)
- Solving MSSP challenges with SOAR
- Swimlane Product Overview (6:38)
- SANS survey highlights pandemic-influenced hiring plans
- Okta and Swimlane
- Diving in with SOAR (1:27)
- Swimlane Turbine for MSSPs
- Automating ATT&CK Testing with SOAR and Atomic Red Team
- Automating Attack Testing with SOAR and Atomic Red Team (46:31)
- Swimlane and Darktrace
- Making MITRE ATT&CK Actionable
- The Life of a Security Analyst Before & After SOAR
- Dark Reading Virtual Panel: What Every Enterprise Should Know About SOCs and Incident Response
- Five benefits to implementing security automation using SOAR
- How to do Incident Response Triage Right
- 2020 SOAR Report Highlights Key Drivers and Impacts
- The Role of Preparation and Process in Incident Response
- Swimlane and FireMon
- Optimizing the MITRE ATT&CK Framework with SOAR
- Automating NERC CIP Compliance
- How to Maximize Your SOAR Investment (43:16)
- The 2020 SANS Automation and Integration Survey results are in!
- Swimlane and LogPoint
- SOAR to New Security Efficiency with Swimlane & Recorded Future
- Swimlane and CrowdStrike
- VPN Status Monitoring & Workflow Automation with SOAR
- Responding to Insider Threats with SOAR
- Swimlane Acquires Syncurity
- SOAR Beyond Endpoint Security with
CrowdStrike & Swimlane
- VPN Status Monitoring (4:12)
- How to Maximize Your SOAR Investment
- Vulnerability Management with SOAR
- Identify Malicious Domains using SOAR
- Elastic Alert Triage and SOAR (2:52)
- 5 Best Practices for Safe and Secure Remote Work
- Swimlane and Tenable
- One team two team red team blue team
- The Future of SOAR
- State of SOAR
- Swimlane SOAR Platform Gets Big Performance Boost Reducing MTTD and MTTR
- You don’t have Windows 7 in your environment, do you?
- State of the SOC and Using SIEM
- The Past, Present and Future of Security Orchestration, Automation and Response (56:25)
- How to investigate alerts in Microsoft Azure with SOAR
- Swimlane and Zscaler
- Swimlane and Netskope
- Swimlane and BlackBerry Cylance
- Swimlane and Carbon Black
- The State of SOAR 2019: How using SOAR tools makes life easier
- New Level-Up Initiative supports security analyst training
- Swimlane gives thanks by giving back
- How to expedite security investigations with Microsoft Azure and Swimlane
- Hey InfoSec, what are you doing to protect your DevOps Team?
- Cloudy with a Chance of DFIR: How Our Traditional Methodologies Need to Change
- How to boost your SOC with automated EDR
- Understanding APIs: SOAP
- Swimlane & Cylance PROTECT: Endpoint Threat Response
- Understanding APIs: REST
- Winning Formula for Cyber Threats = SOAR + Endpoint Security
- How to Achieve SOC Efficiency with Graylog and Swimlane
- 3 SOAR solution pitfalls to avoid when implementing
- Swimlane Certification Program
- Automated Malware Analysis (7:09)
- Optimize SecOps by pairing SIEM with SOAR
- SOAR Use Case: Domain Squatting, Typosquatting and Homograph Detection
- Integrating Swimlane and Splunk (3:06)
- How do you know if you’re ready for SOAR?
- Best practices for your Vulnerability Management Program
- What to expect at Black Hat USA 2019
- SOAR Use Case: Amazon Web Services
- Every security team is a software team now: Why you should attend the Black Hat keynote
- Automating Malware Analysis and Response with Intezer and Swimlane
- Black Hat 2019: Best sessions for SecOps
- Microsoft Defender Advanced Threat Protection Queries
- Swimlane's pyattack works with Mitre ATT&CK Framework
- Staying on Top of Phishing Emails with Threat Intelligence and SOAR
- Integrating Swimlane and Symantec DeepSight Intelligence (2:36)
- Swimlane open-sources graphish to help SecOps Teams
- SOAR Use Case: Proactive Credential Dump Hunting
- Integrating Swimlane and ServiceNow (2:38)
- Swimlane raises $23M of series B funding
- Integrating Swimlane and CylancePROTECT (3:28)
- The life of a security analyst before and after SOAR (6:18)
- Swimlane research team open sources py-ews
- Windows patch released after critical RDP vulnerability
- Data Breach Statistics from the Verizon DBIR 2019
- Automate employee off-boarding processes with Swimlane
- Automated Threat Hunting with SOAR (5:46)
- Use Case: Automated EDR
- SOAR Use Case: Employee Off-Boarding
- General availability of Swimlane 4.1
- Integrating Swimlane and Microsoft Graph Security (1:50)
- Swimlane and Lastline
- Microsoft's OAuth2 implementation: Using Microsoft Graph API
- EDR in the Fast Lane: Automating Endpoint Alerts
- Microsoft's OAuth2 implementation: Registering an app
- How Swimlane shaped the company culture
- Endpoint Detection and Response with SOAR (5:47)
- SIEM Alert Triage with SOAR
- Using Swimlane for endpoint detection and response
- Swimlane runner-up in Microsoft Graph Security Hackathon
- Microsoft's OAuth2 endpoints and application types
- Integrating Swimlane and Recorded Future (2:39)
- SOAR Use Case: Automated Malware Analysis (42:23)
- Integrating Swimlane and Palo Alto Panorama (2:27)
- The Norsk Hydro LockerGoga ransomware cyber attack
- Swimlane makes a splash at RSA Conference 2019
- Swimlane and McAfee Products
- What to expect at RSA Conference 2019
- Integrating Swimlane and VMRay Analyzer Cloud (2:21)
- A call for collaboration in cybersecurity
- Integrating Swimlane and Carbon Black Defense (2:09)
- RSA Conference 2019: Best sessions for SecOps
- What's new at Swimlane? Find out at RSA 2019
- Swimlane and Tufin SecureTrack
- Partnerships aid your security operations center ecosystem
- SOAR Use Case: Automated Malware Analysis
- How sharing content improves incident response
- Threat intelligence and SOAR: An integrated approach with Swimlane and Recorded Future (42:13)
- New year, new security - Part 2: Cloud computing use cases
- Swimlane is making a splash at RSA 2019
- New year, new security - Part 1: IoT use cases
- SOAR Buyer's Guide
- Why we’ve built Swimlane the way we have
- Measuring ROI in SOAR (3:50)
- Key takeaways from MPOWER 2018
- SOARing Beyond Aggregation: How to Achieve Meaningful Correlation and Prioritization of Security Alerts and Actions
- From Risk to Action - Security Automation and Orchestration
- Ingalls & Swimlane: How SOAR delivers value for your security operations center (SOC)
- Why organizations should use a SOAR solution for ROI and MTTR tracking
- MPOWER 2018: How can SOAR help you measure ROI for your SOC?
- Swimlane for the Security Engineer (3:13)
- Swimlane for the Security Manager (1:50)
- Swimlane for the CISO (1:56)
- Endpoint protection: How to improve endpoint security with SOAR
- Swimlane for the Security Analyst (2:18)
- How to streamline cyber forensic investigations
- Swimlane Workflow (7:00)
- Integrating Swimlane and McAfee products (6:28)
- Farewell, Summer Interns
- Automating Splunk Alert Triage Demo (4:11)
- Business Intelligence for Security Operations (3:59)
- SOAPA and SAO: Adapting SecOps Strategies to Keep Up with Today’s Cyber Threats
- Threat Intelligence and Security Orchestration, Automation and Response with Lastline
- Security Automation and Orchestration with Swimlane and Forrester
- SecOps Hub: New security operations community
- Gartner SOAR report: "Innovation Insight for Security Orchestration, Automation and Response"
- Using security automation and orchestration for SIEM triage
- Improving IT resiliency with SOAR
- Improving incident response with the NIST Cybersecurity Framework and security automation and orchestration (SAO)
- Security automation and orchestration: Real-world use cases
- Improve security operations management
- Supply chain security
- Building an IT incident response plan
- Achieving cyber resilience through situational awareness
- Poison the well: Offensive ops for defenders
- Security operations strategy webinar | SOAPA and SAO: Adapting SecOps strategies to keep up with today’s cyberthreats
- RSA NetWitness alerts managed with security automation and orchestration (SAO)
- Using security automation and orchestration for incident alert management
- Using a threat intelligence platform for stronger cybersecurity
- Utilizing the McAfee product suite and Swimlane to automate incident response
- Automating cybersecurity incident response plans
- Threat intelligence tools: Identify, prioritize and act
- The need to integrate cybersecurity tools
- Cybersecurity statistics 2017: A hard look at the facts and future
- Realizing an information security risk management framework
- Security Orchestration | What is Security Orchestration?
- Cybersecurity staffing shortage | Maximize MSSP efficiency with SAO
- Are too many SIEM alerts overwhelming your staff? Use SAO.
- Security alert management: Simplified with automation
- Cybersecurity staffing shortage? Security automation and orchestration can help
- Security operations efficiency: Do more with your existing staff
- Using situational awareness to improve threat response effectiveness
- Automated incident response: Respond to every alert
- Improving SecOps communications with your board of directors
- Don’t be an asymptote! Understanding the cost of delayed threat response
- Automate ThreatGrid investigation and response with out-of-the-box Swimlane integrations
- MTTD vs. MTTR in Cybersecurity: A Complete Guide to Reducing Detection and Response Times
- Security consolidation vs. security orchestration
- The challenges facing security operations teams
- Two 2017 cybersecurity trends every security operations professional should know
- Best practices to fortify your cybersecurity strategy
- Top four causes of unsustainable security operations
- Three major security operations mistakes
- Student hacking: A threat, but a bigger opportunity
- Three burning questions about automating vulnerability lifecycle management—Part 1
- Cyberattacks are, most likely, an inside job
- Automated security operations for managed security service providers (MSSP)
- Cybersecurity and incident response for your car?
- Create hurdles for hackers with an automated incident response strategy
- Ashley Madison breach shows ugly side of hacking
- Recent data breach exposes millions of medical records
- How to get more out of existing cybersecurity tools instead of replacing them
- How automated security operations relates to morale and retention
- Fallout continues in OPM breach as damage proves worse than originally thought
- Examining education’s role in cybersecurity’s future
- Seven startling stats on the cybersecurity skills shortage
- New report shows dire cybersecurity talent gap extends to state governments
- Bringing security operations automation to processes with no name
- The latest government data breach looks like a nightmare
- Cyber espionage hits the baseball diamond
- The top five long-term effects of the Target breach
- Three tasks you should be automating in your SOC
- Gartner insight on incident response management
- How the cybersecurity talent shortage impacts us all
- Stop pushing security analytics reporting to the back burner
- Stop pushing security analysis reporting to the back burner
- Why staffing up alone isn’t a sustainable cybersecurity solution
- Why managing information security as a business risk is critical, part 3: Intellectual property
- Why even 99 percent isn't good enough for incident response
- Why managing information security as a business risk is critical, part 2: Reputational harm
- Ten facts every cybersecurity professional should know
- Why managing information security as a business risk is critical, part 1: Financial impact
- Completing the information security lifecycle
- Three essentials your employee cybersecurity training must cover
- Why aligning your SOC and C-suite on cybersecurity is critical
- Three crucial questions to ask before adopting a cybersecurity solution
- Cybersecurity drivers part 4: Security information overload
- Are you leveraging threat intelligence for incident response?
- Cybersecurity drivers part 3: The threat landscape
- Creating a new generation of cybersecurity professionals
- Cybersecurity drivers part 2: The talent shortage
- IT security professionals: Stop hemorrhaging time
- Cybersecurity drivers part 1: The Internet of Things
- Top 5 Cybersecurity Incident Response Metrics to Track
- No security alert left behind: Swimlane launches automated security operations management platform
- Protecting the capital investments in your SOC
- SOC employee turnover: Retaining institutional knowledge
- Automation: The natural next step in security operations management
- Filling the gap in cybersecurity
Leadership
News
Events
History