Swimlane Blog

Improving SecOps Communications with Your Board of Directors

By | Security Operations Weekly | No Comments

Presenting well to the board is critical for security operations.  It’s frequently the best opportunity to demonstrate value in quantifiable terms to solidify continued support for the organization’s future initiatives.  Yet presenting to the board can also be an incredibly stressful. A recent Trustwave study noted, “40 percent of security professionals feel the most pressure in relation to their security…

Read More

Don’t Be an Asymptote! Understanding the Cost of Delayed Threat Response

By | Uncategorized | No Comments

It should be the unwritten rule of cybersecurity: Don’t make an asymptote of yourself or your team members. As you may recall from high school math, an asymptote is a graphical representation of a function that trends endlessly either toward zero or infinity. In the case of threat response, the potential cost of a delay can resemble the latter —…

Read More

Automate ThreatGrid Investigation and Response with Out-of-the-Box Swimlane Integrations

By | Security Operations Weekly | No Comments

Out-of-the-Box Integrations Automate Cisco AMP ThreatGrid Malware Defense Processes A common repetitive task performed in a SOC is to submit suspicious files to a malware sandboxing technology.  These technologies then execute the binary in a safe environment and report back with valuable details about how that particular bit of malware works.  Analysts follow up by reviewing the results and taking…

Read More

Reducing Security Operations MTTD and MTTR

By | Security Operations Weekly | No Comments

For many security operations (SecOps) teams, the real measure of where the “rubber meets the road” is tied to two metrics—Mean Time to Detect (MTTD) an attack, and the Mean Time to Respond (MTTR), (the time needed to take action and neutralize the threat).  As the stakes of a cyber-attack increase, management wants to see progress on both metrics. Improvement…

Read More

Security Consolidation vs. Security Orchestration

By | Security Operations Weekly | No Comments

The Right Choice Will Make All the Difference A recent survey at the ISACA/RSA conference found that a third of organizations take 6 months or more to fill a cyber security position, and 10% can’t fill them at all.  This chronic shortage of cyber security professionals is exacerbated as the number of security tools in use continues to increase.  SecurityIntelligence.com…

Read More
Swimlane Real Challenges Facing Security Operations

The Real Challenges Facing Security Operations Teams

By | Security Operations Weekly | No Comments

With most organizations, the only thing standing between them and a data breach potentially resulting in huge financial losses is the Security Operations (SecOps) team.  Every day they’re charged with identifying, classifying, and remediating a growing number of cyber-threats, making efficient and repeatable processes essential.  This is becoming increasingly difficult as the volume of threats continues to explode. To put…

Read More
Two 2017 Cyber Security Trends Every Security Operations Professional Should Know

Two 2017 Cyber Security Trends Every Security Operations Professional Should Know

By | Security Operations Weekly | No Comments

Key Findings of the PwC Global State of Information Security 2017 Every year a small number of landmark research surveys provide insight and understanding to enable more effective cyber security protection. The 2017 PwC “Global State of Information Security” report is one of these studies, based on interviews with more than 10,000 business and IT executives. While it’s a broad…

Read More
Best Practices to Fortify Your Cyber Security Strategy

Best Practices to Fortify Your Cyber Security Strategy

By | Security Operations Weekly | No Comments

There’s no question that the Denver Broncos beat the Carolina Panthers thanks to their defense. Defense alone carried the Broncos while Peyton Manning was out earlier in the season, and it carried them all the way through the post season, culminating in a 24-10 championship victory. The Broncos’ defense, in fact, is being referred to by some—like ESPN’s John Clayton—as…

Read More
Top 4 Causes of Unsustainable Security Operations

Top 4 Causes of Unsustainable Security Operations

By | Security Operations Weekly | No Comments

It shouldn’t come as a surprise that organizations are struggling to establish and maintain superior security operations methods. In fact, only 45 percent of global organizations are confident in their security relative to today’s threats, according to Cisco’s 87-page “2016 Annual Security Report.” So, what is affecting the majority of organizations so that they cannot implement effective security methods? In…

Read More

Improve your Security Operations