Blog | Swimlane 

Swimlane Blog

Reducing Security Operations MTTD and MTTR

By | Security Operations Weekly | No Comments

For many security operations (SecOps) teams, the real measure of where the “rubber meets the road” is tied to two metrics—Mean Time to Detect (MTTD) an attack, and the Mean Time to Respond (MTTR), (the time needed to take action and neutralize the threat).  As the stakes of a cyber-attack increase, management wants to see progress on both metrics. Improvement…

Read More

Security Consolidation vs. Security Orchestration

By | Security Operations Weekly | No Comments

The Right Choice Will Make All the Difference A recent survey at the ISACA/RSA conference found that a third of organizations take 6 months or more to fill a cyber security position, and 10% can’t fill them at all.  This chronic shortage of cyber security professionals is exacerbated as the number of security tools in use continues to increase.  SecurityIntelligence.com…

Read More
Swimlane Real Challenges Facing Security Operations

The Real Challenges Facing Security Operations Teams

By | Security Operations Weekly | No Comments

With most organizations, the only thing standing between them and a data breach potentially resulting in huge financial losses is the Security Operations (SecOps) team.  Every day they’re charged with identifying, classifying, and remediating a growing number of cyber-threats, making efficient and repeatable processes essential.  This is becoming increasingly difficult as the volume of threats continues to explode. To put…

Read More
Two 2017 Cyber Security Trends Every Security Operations Professional Should Know

Two 2017 Cyber Security Trends Every Security Operations Professional Should Know

By | Security Operations Weekly | No Comments

Key Findings of the PwC Global State of Information Security 2017 Every year a small number of landmark research surveys provide insight and understanding to enable more effective cyber security protection. The 2017 PwC “Global State of Information Security” report is one of these studies, based on interviews with more than 10,000 business and IT executives. While it’s a broad…

Read More
Best Practices to Fortify Your Cyber Security Strategy

Best Practices to Fortify Your Cyber Security Strategy

By | Security Operations Weekly | No Comments

There’s no question that the Denver Broncos beat the Carolina Panthers thanks to their defense. Defense alone carried the Broncos while Peyton Manning was out earlier in the season, and it carried them all the way through the post season, culminating in a 24-10 championship victory. The Broncos’ defense, in fact, is being referred to by some—like ESPN’s John Clayton—as…

Read More
Top 4 Causes of Unsustainable Security Operations

Top 4 Causes of Unsustainable Security Operations

By | Security Operations Weekly | No Comments

It shouldn’t come as a surprise that organizations are struggling to establish and maintain superior security operations methods. In fact, only 45 percent of global organizations are confident in their security relative to today’s threats, according to Cisco’s 87-page “2016 Annual Security Report.” So, what is affecting the majority of organizations so that they cannot implement effective security methods? In…

Read More
3 Major Security Operations Mistakes

3 Major Security Operations Mistakes

By | Security Operations Weekly | No Comments

In a recent webinar, Swimlane Founder and CEO Cody Cornell elaborated on four major causes of unsustainable security operations: an unprecedented volume of attacks, alert fatigue, antiquated response tools and lack of qualified cyber security staff. To deal with these challenges, organizations have tried implementing a number of different security methods—some which work and some which can actually do more…

Read More
Automating Vulnerability Lifecycle Management

3 Burning Questions About Automating Vulnerability Lifecycle Management—Part 2

By | Security Operations Weekly | No Comments

In Part 1 of this series we discussed what vulnerability lifecycle management is, and why automating this process is crucial for long-term success. In an effort to help educate organizations on security and vulnerability automation, as well as guide them in their decision making processes, Swimlane Founder Cody Cornell answered three burning questions on the topic. “What challenges organizations face…

Read More
Swimlane Student Hacking A-Threat but a Bigger Opportunity

Student Hacking: A Threat, but a Bigger Opportunity

By | Security Operations Weekly | No Comments

Over the years we’ve seen massive cyber attacks on renowned brands like Ashley Madison, Target, Sony and Home Depot; however, not all attacks are aimed against corporations. Some of today’s most noteworthy attacks are happening in the modern-day classroom as more school processes become Internet-enabled and, perhaps more importantly, as students become more skilled in the art of hacking. Case…

Read More

Improve your Security Operations