Blog
Insights for the modern SOC
Actionable thinking for teams that want more from their security stack.

All
AI
All Categories
Amazon S3
API Security
Business Apps
CDN & Edge
CISO
Cloud
Company News
CSPM
Database Security
Detection tools
DevSecOps
DLP & Data Security
EDR
EDR
Email & Training
Firewalls & Network
IAM
IDS/IPS
Logging & Data Pipeline
MDR
NAC
NDR
OT/ ICS
Phishing
SASE
Security Automation
Security Operations
SIEM
SOAR
SOC Operations
SWG & Proxy
Threat Intelligence
VPN & ZTNA
Vulnerability Management
WAF
A practical guide to scaling security operations
Security must scale to protect growing attack surfaces that result from organizational growth.
Implementing a modern SOC: Overcoming the challenges
Facing SOC challenges head-on: Tools, talent, AI, and tactics that actually work.
Guidance and tips for a first-time CISO
Discover what it takes to lead with strategy, communicate risk, and build successful teams.
Breaking free from alert fatigue
There just are too many alerts for SOC teams to handle. Here's how to regain control and security.
How to advance from SOC manager to CISO?
Making the move from managing a security operations center (SOC) to being a chief information security officer (CISO) is a significant career leap. Not only do you need a solid foundation of tech knowledge but also leadership skills and business smarts. This article will guide you through the practical steps and skills you’ll need to […]
6 steps to 24/7 in-house SOC success
With the right people and processes in place, you can fully automate threat detection, resulting in faster response times and enhanced security.
How to properly implement EDR in your enterprise
Real-world EDR deployments can trip you up. Here are best practices and a step-by-step deployment roadmap.
Radiant introduces broadest security coverage with adaptive AI SOC platform
Broad coverage of all security use cases is critical for an AI SOC platform and Radiant has got what it takes.
SOC 3.0 – The evolution of the SOC and how AI is empowering human talent
Learn how the SOC evolved over time how that set the stage for a new era of security operations.