The Playbook Series on our blog remains one of our most popular content features. With dozens of posts in the series, we thought it would be interesting to showcase three of the most popular Phantom Playbooks from the year. First up is the Ransomware Playbook. Phantom can ingest either a suspicious file or file hash … Continue reading Top 3 Phantom Playbooks for 2016
Feedback about the Phantom security automation and orchestration platform is incredibly important to all of us here at Phantom. As the product manager for the Phantom platform, I’m a strong believer of listening to current and future customers, as well as the ever-growing membership of the Phantom community. Our most recent patch release to the … Continue reading Phantom Releases Patch Update to 2.0 Platform
Many Federal organizations are working to enhance their security posture by leveraging DHS’s Continuous Diagnostics and Mitigation (CDM) Phase 1 program to help them with their security issues, especially around issues relating to vulnerabilities and patching.
One of the most powerful capabilities of the Phantom platform is its support for nested playbooks. When defining your process as a Phantom playbook, one of the four main branching choices offered by the Integrated Development Environment (IDE) is another playbook. Nesting a playbook within a playbook using the Phantom platform’s visual automation IDE. … Continue reading Playbook Series: Creating Nested Playbooks for Responding to Malware Incidents
As we approach the one-year anniversary of the Phantom security automation and orchestration platform, we wanted to look back at how new releases of the platform have enabled more sophisticated playbooks. The Phishing playbook is a great example of how new platform developments have lifted the barriers to security automation.