Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SecOps

Torq for MDR: Increase Margin and Onboard Customers Faster

Managed detection and response providers (MDRs) are at an inflection point. They previously relied on legacy SOAR to secure their customers. But SOAR solutions struggle to keep up with the evolving and maturing threat landscape, and were not designed to scale into cloud environments. As a way to break free from SOAR’s shortcomings, MDRs are turning to hyperautomation.

The Howler - Episode 3 - Dan Schiappa, Chief Product Officer

In this episode, our hosts sit down with Dan Schiappa, Chief Product Officer at Arctic Wolf. Dan is responsible for driving innovation across product, engineering, alliances, and business development teams to help meet demand for security operations through Arctic Wolf’s growing customer base—especially in the enterprise sector.

The Howler - Episode 1 - Brian NeSmith, Co-Founder and Executive Chairman of Arctic Wolf

In the first Howler podcast episode, our hosts sit down with Brian NeSmith, Co-Founder and Executive Chairman of Arctic Wolf. Brian NeSmith is an internationally recognized business leader, bringing more than 30 years of cybersecurity leadership, including extensive experience driving revenue growth and scaling organizations globally. Before founding Arctic Wolf, he served as CEO of Blue Coat Systems, and prior to Blue Coat, CEO of Ipsilon Networks (acquired by Nokia), which became the leading appliance platform for Check Point firewalls.

The Howler - Episode 2 - Adam Marrè - Chief Information Security Officer

In this episode, our hosts sit down with Adam Marrè, Chief Information Security Officer at Arctic Wolf. Prior to joining Arctic Wolf, Adam was the Global Head of Information Security Operations and Physical Security at Qualtrics. With deep roots in the cybersecurity space, Adam spent almost 12 years with the FBI, holding positions like SWAT Senior Team Leader and Special Agent. In this episode, Adam gives us a peak into the life of a CISO, what keeps him up at night, how he manages stress, and what he believes is foundational to leadership.

5 SecOps Cloud Platform Benefits for Cybersecurity Builders

The SecOps Cloud Platform (SCP) is LimaCharlie’s vision for the future of cybersecurity. The SCP delivers core cybersecurity capabilities and infrastructure API-first, on-demand, and pay-per-use. It’s a paradigm shift similar to what the IT public cloud did for IT—but for cybersecurity. The SCP model benefits nearly everyone working in security today, from large organizations and enterprise security teams to managed service providers and SMBs.

Unlocking the Power of Co-Managed SOC: A Strategic Solution for Maximizing SIEM Effectiveness and Cybersecurity Success

Security information and event management (SIEM) systems play a pivotal role in cybersecurity: they offer a unified solution for gathering and assessing alerts from a plethora of security tools, network structures, and software applications. Yet, the mere presence of a SIEM isn't a magic bullet. For optimal functionality, SIEM systems must be appropriately set up, governed, and supervised round-the-clock.

How to Secure Your Network Infrastructure

Network infrastructure is not immune from the schemes of cybercriminals. State sponsored actors have U.S. Cybersecurity and Infrastructure Security Agency (CISA) concerned after a spike in attacks on networks. In April, Sudan-linked hackers launched a distributed denial of service (DDoS) attack on an Israeli government network, — and in late 2022, Arctic Wolf Labs issued a warning about a multiple CVEs tied to the Cisco Nexus Dashboard.

Dmitriy Sokolovskiy: How SecOps teams can measure and communicate their ROI to senior leadership

In this episode of The Future of Security Operations podcast, Thomas interviews industry veteran Dmitriy Sokolovskiy. Dmitriy is a founding member of (ISC)2 Eastern Massachusetts Chapter, and has over 25 years of experience in the security industry, having led teams at Putnam Investments, CyberArk, and, most recently, Avid. He’s a mentor and advisor to several successful startups and sits on the advisory board of companies like Audience 1st.

7 Types of Social Engineering Attacks

When a ransomware group launched twin cyber attacks on casino giants MGM and Caesars, they only needed the accidental participation of the organizations’ outsourced IT help desk to get started. It was social engineering — in this case impersonation over the phone, or vishing— that gave the hackers the information they needed to launch a ransomware attack that cost both casinos millions.