Automation has become so relevant to the mainstream; in our cars, our homes, and even our music. Allow me to digress a bit. The DAW (Digital Audio Workstation) is a mainstay in modern music production. In short, it’s HW or SW that musicians use to record, edit, and produce audio. If you’ve used tools like GarageBand, then you’ve experienced music production capabilities like that of a DAW.
I’ve been involved in information technology and the information security space for over twenty years and have seen an industry that’s been constantly trying to solve common IT security threats with a plethora of software and hardware tools. In the early days, antivirus appeared to be the right solution to the problem. As the sophistication of attacks … Continue reading My Journey to Security Automation & Orchestration
This entry is the first in a series that outline key criteria to consider when evaluating Security Automation & Orchestration (SA&O) platforms. Here at Phantom, we define security orchestration as “the machine-based coordination of a series of interdependent security actions across a complex infrastructure.” Considering this definition, it’s easy to derive that one of the … Continue reading Top Three Criteria: Orchestrator
SecureWorld Boston is coming up next week (March 22-23) and I’ve just finished reviewing the agenda for sessions that I would like to attend. When looking at the topics through the lens of automation and orchestration, I always notice so many relevant options—more sessions than I’ll likely have time to attend. Talks like Designing and … Continue reading Automate Anything?
Custom Lists are a powerful capability of the Phantom platform. Customers typically use Custom Lists to maintain a dynamic list of items that persists on the platform. The function also commonly serves a caching mechanism to reduce overburdening a service. Custom Lists are available on-platform to playbooks and externally to third-party systems. In this blog entry, we will explore … Continue reading Using Custom Lists in Phantom Playbooks
TED Talks have been the inspiration for several posts. There is likely a correlation between the time spent on airplanes and TED Talk references on the blog. In his talk titled, “How AI can bring on a second Industrial Revolution,” Kevin Kelly introduces several concepts germane to security automation. One claim Kevin made that really … Continue reading Your future salary might depend on how well you work with machines
“Playing in an orchestra is completely different to playing on my own. Sometimes I played, sometimes listened; instead of waiting my turn, I sometimes interrupted another player, sometimes I argued, sometimes agreed.” ― Kevin Crossley-Holland, Heartsong In my previous entry, I discussed Selecting Use Cases for Automation. Next comes the exciting part of playbook design—technology … Continue reading Selecting Tools for Orchestration