Pricing Login Free trial Support
All an engineer has to do is click a link, and they have everything they need in one place. That level of integration and simplicity helps us respond faster and more effectively.
Sajeeb Lohani
Global Technical Information Security Officer (TISO), Bugcrowd
Read case study

Blog

Enrico Benzoni

Filter resources

How to tackle Microsoft 365 account compromise and credential theft

Mar 9, 2023 / 4 min read

How to choose and track your security KPIs

Feb 28, 2023 / 3 min read

Why the quickest response is not always the best in cybersecurity

Jan 12, 2023 / 5 min read

How Sumo Logic helps you comply with the CERT-In Directions 2022

Sep 15, 2022 / 4 min read

SIEM vs SOAR : Evaluating security tools for the modern SOC

Jun 29, 2022 / 4 min read

Why you need both SIEM and SOAR to improve SOC efficiencies and increase effectiveness

Apr 14, 2022 / 6 min read

Cloud-native SOAR and SIEM solutions pave the road to the modern SOC

Feb 1, 2022 / 6 min read

How to justify and increase your cybersecurity budget

Sep 13, 2021 / 4 min read

How to implement cybersecurity automation in SecOps with SOAR (7 simple steps)

Sep 8, 2021 / 6 min read

SOC vs. CSIRT – understanding the difference

Oct 19, 2020 / 4 min read

National Cyber Security Awareness month 2020 – The importance of SOAR

Oct 7, 2020 / 5 min read

How security automation and orchestration helps you work smarter and improve Incident Response

Sep 25, 2020 / 4 min read

5 common Security Orchestration, Automation and Response (SOAR) use cases

Aug 17, 2020 / 6 min read

SOAR to the sky: Discover the power of next-gen progressive automation

Aug 17, 2020 / 6 min read

Standard Operating Procedures as big piece of the cyber Incident Response puzzle

Jun 23, 2020 / 2 min read

The difference between playbooks and runbooks in Incident Response

Jun 12, 2020 / 4 min read

The cost of cybersecurity solutions vs. the cost of cyber attacks

May 7, 2020 / 5 min read

The top 5 challenges faced by Security Operations Centers

Mar 20, 2020 / 4 min read

Automation in cybersecurity: Benefit or a threat?

Mar 17, 2020 / 5 min read