Overview
Explore
Labs
Services
Events
Partners
Select a tab
61 results found
A Practitioner's Guide: SOC of the Future
Is the future here? Can we build a scalable, agile foundation that leverages robust data management and pipelines to enable real-time alerting? Can it leverage AI-augmentation and automated responses to proactively detect and mitigate threats? I think we may be close...
Blog
•Mar 10, 2025
A CTO's Primer on Breach & Attack Simulation: Part 1 - Market Landscape
Breach and attack simulation (BAS) tools are revolutionizing cybersecurity by automating threat testing. While tools like AttackIQ and Mandiant Security Validation lead the market, organizations must prioritize their unique needs over flashy features. This article explores how to select the right BAS solution to align with strategic goals and optimize security.
Blog
•Apr 2, 2025
Onum, Pangea and the Path to the Agentic SOC: Highlights from Fal.Con 2025
AI is revolutionizing cybersecurity, transforming both attackers and defenders. At Fal.Con 2025, CrowdStrike unveiled its vision of an agentic SOC powered by intelligent agents and streaming pipelines. This shift towards AI-native security platforms aims to enhance collaboration, autonomy and governance, heralding a new era of intelligent, proactive security operations.
Blog
•Sep 19, 2025
Understanding Salt Typhoon: Why Security Leaders Should Take Notice
Salt Typhoon, a Chinese state-sponsored cyber espionage campaign, has targeted critical U.S. telecommunications infrastructure, exposing vulnerabilities and compromising sensitive data. This sophisticated operation underscores the urgent need for robust cybersecurity measures and heightened awareness among security leaders to protect against evolving threats.
Blog
•Feb 7, 2025
Introduction to Cortex XDR
Learn how Cortex XDR secures the future by rewiring security operations.
Blog
•Jan 24, 2023
How Generative AI Impacts Identity and Access Management
Explore the potential of generative AI to transform the four pillars of Identity and Access Management (IAM): authentication, authorization, administration and auditing.
Blog
•Aug 7, 2023
SIEM Overload to Smart Security: The Power of Data Pipeline and Modern Storage
Traditional SIEMs have long been treated as massive log repositories, leading to skyrocketing costs and visibility gaps. Data pipeline management changes the game — optimizing log ingestion, enriching security data, and reducing SIEM costs without sacrificing detection capabilities. Learn how modern data pipelines, security data lakes and AI-driven analytics are transforming SOC efficiency and redefining how organizations manage security telemetry.
Blog
•Feb 26, 2025
Understanding the DPRK Remote Worker Threat
North Korean cyber operatives are increasingly sophisticated, using AI-enhanced deception and exploiting privileged roles to infiltrate global enterprises. This article explores their evolving tactics, critical vulnerabilities, and strategies to bolster cybersecurity defenses against these advanced persistent threats.
Blog
•Apr 3, 2025
Why WWT + Splunk: Turning Data into Digital Resilience the Right Way
Every enterprise runs on telemetry that streams from apps, networks, clouds and endpoints. Splunk turns that data into insight. WWT turns that insight into outcomes: architectures, integrations and services that scale across observability, security and automation.
Blog
•Sep 10, 2025
Cybersecurity Awareness: Multi-factor Authentication (MFA)
October is Cybersecurity Awareness Month. This week, let's all be rigorous in how we're enabling multi-factor authentication.
Blog
•Oct 10, 2023
CrowdStrike's Fal.Con 2023 Key Takeaways
CrowdStrike's Fal.Con 2023 provided intriguing announcements about an upcoming acquisition, additional modules and key integrations that are moving CrowdStrike closer to a platform consolidation strategy. Here's a recap of this exciting event.
Blog
•Sep 22, 2023
Core Routing Security: MACsec
The use of MACsec within network cores is exploding in popularity due to rising security demands and recent hardware advancements. This article explores MACsec's evolution, benefits and deployment considerations to help get you on your way to securing your high-speed core links.
Blog
•Jun 17, 2025