-
A Modern Playbook for Ransomware
SOC teams need every advantage against ransomware. Learn how a SOAR playbook can streamline incident response, saving time and minimizing the impact of attacks.
-
How to Build a SOAR Playbook: Start with the Artifacts
Simplify SOAR playbook development with an artifact-based approach. Learn to integrate tools, categorize commands, map key artifacts, and build effective playbook stages.
-
100% of MSSPs Plan to Use AI—But How?
Artificial intelligence (AI) is going to revolutionize security operations. That much should be uncontroversial. The real questions are what form will that revolution take and…
-
Stop Ransomware in its Tracks: Suspicious File Activity
The Threat Scenario Consider a scenario where your file server, “D3Cyber-FileServer,” triggers an alert. The alert indicates an encryption attempt on “important_document.docx” by the command-line…
-
How to Build a Phishing Playbook Part 3: Playbook Development
Welcome the third part of our series on how to build an automated incident response playbook for phishing threats inside of Smart SOAR. In this…
-
Advancing SOAR Technology: Key 2023 Updates in Incident Response Automation
In 2023, we’ve achieved a remarkable milestone in the cybersecurity landscape by securing 70% of our new business from security teams eager to upgrade from…
-
What’s New in Smart SOAR (December 2023 Release)
Our latest update to Smart SOAR brings many enhancements that provide a more nuanced control over incident management and tenant operations. Key updates include a…
-
How Data Ingestion Works in SOAR
SOAR tools work as consolidation platforms for security alerts and incident response. Endpoint security tools, network security tools, email systems, and other tools collect logs,…
-
How to Build a Phishing Playbook Part 1: Preparation
Automating response to phishing attacks remains one of the core use-cases of SOAR platforms. In 2022, the Anti-Phishing Working Group (APWG) logged ~4.7 million phishing…