
Phishing the C-suite: how quick-acting SOC teams caught what everyone else missed
In a recent multi-company phishing campaign, threat actors targeted high-level executives, CEOs, SVPs and finance manag...
In a recent multi-company phishing campaign, threat actors targeted high-level executives, CEOs, SVPs and finance manag...
AI, Security Automation, SOC Operations
Organizations today face relentless cyber attacks, with high-profile breaches hitting the headlines almost daily. Refle...
The job of a SOC analyst has never been easy. Faced with an overwhelming flood of daily alerts, analysts (and sometimes...
Behavioral analytics, long associated with threat detection (i.e. UEBA or UBA), is experiencing a renaissance. Once pri...
The current SOC model relies on a scarce resource: human analysts. These professionals are expensive, in high demand, a...
Security Orchestration, Automation, and Response (SOAR) was introduced with the promise of revolutionizing Security Ope...
What is Microsoft 365? Microsoft Office 365, often referred to as Office 365 or simply O365, is a comprehensive suite o...
Learn how to automate Crowdstrike EDR alert triage with AI using Radiant Security.
This article explores the potential disadvantages of using artificial intelligence in cybersecurity. Learn more about t...
Learn how AI-enabled incident triage works, including its benefits, and its impact on key security operations center KPIs.
A customer looking to boost SOC productivity detected, investigated, & remediated a real incident within 2 hours of...
How to Boost security Analyst Moral & Retention with AI-based Security Operations
Autonomously triage, investigate, contain and respond to every alert in an automated manner using AI and machine learning.
Product Tour