This multi-part article is focused on selecting the right skills for your SA&O project. In part one, we identified eight skills that you’ll need to be successful. They are:
This article is a part of a series describing the essential criteria of a Security Automation and Orchestration platform. One of the most important functions of a Security Automation and Orchestration (SA&O) platform is to reduce the need to manually triage low priority and false positive alerts. Just after data ingestion, an alert management … Continue reading Core SA&O Platform Capability: Alert Management
In my previous entry, I wrote about Selecting Tools for Orchestration. This multi-part article continues on the theme, focused on selecting the right skills for your project. Intro I’m going to admit something to you: I not very good at the Do-It-Yourself home project thing. I have always been more focused on the art of … Continue reading Selecting the Right Skills for Your SA&O Project (Part 1 of 2)
The Phantom Community has been very active in 2017! We consistently grow in community members each day, with activity in our Phantom Community Slack channel growing in sync. We’ve also had lots of great App and Playbook contributions from our community members. To continue with our history of recognizing leading community contributors, like the HOF … Continue reading Announcing the First Phantom Community Contributor of the Month!
Phishing investigations is one of the most common use cases that we have observed security teams selecting to automate. We’ve written about it before, and covered it on a few Phantom Tech Sessions. Still, as I learned more about Rackspace’s use case, I thought it would be interesting to share it with the community. It’s … Continue reading Phishing in South Texas
Last month on March 23, 2107 the Johns Hopkins University Applied Physics Lab (JHU/APL) held their most recent Integrated Adaptive Cyber Defense (IACD) Project Community Day. The event hosted 136 unique organizations across a variety of industries. It featured an IACD Overview, an IACD Framework Brief, and an Implementation Findings Brief presented by the JHU/APL … Continue reading Integrated Adaptive Cyber Defense Project
We have another exciting partner and community playbook lined up for the Tech Session this week! We are featuring a new Phantom app that integrates with PhishMe’s Phishing Defense Cloud. We talk often about the depth, or completeness, of Phantom apps. The PhishMe app is no exception, providing seven actions that span ingestion as well as … Continue reading PhishMe Joins the Next Phantom Tech Session