Remove tag soc
article thumbnail

Our Latest Open Source Innovation, Yor: Automated IaC Tag and Trace

Palo Alto Networks

While sitting in a security operations center (SOC) in the middle of a high-severity incident, you realize Secure Shell Protocol (SSH) (port 22) is open to the world. To make that process easier to navigate, many organizations leverage cloud tagging as a scalable way to attribute cloud resources to organizational owners.

article thumbnail

Palo Alto Networks Secures Black Hat from Itself

Palo Alto Networks

The network and security operations center (NOC/SOC) at the Black Hat USA Conference serves the critical role of ensuring that the conference's entire network is running smoothly and efficiently, as well as detecting and responding to any security threats. The Black Hat NOC team in 2022.

Network 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Manage a Remote SOC: Playbooks for Monitoring Remote User Activity

Palo Alto Networks

If your SOC is remote, the rest of your organization likely is as well, which means you’re responsible for securing many remote end users as they connect to corporate or branch office networks. Turbocharge Your Remote SOC Operations . Watch for more useful tips and hints in the next post in our series on the remote SOC.

article thumbnail

NginxDay

Lacework

Per Nginx’s blog post , disabling Nginx’s ldapDaemon configuration can prevent the exploitation of this vulnerability. SSH tag describes the indicator – not the activity): Figure 1. and not with Nginx itself. This indicates a low surface area risk relative to what we observed with Log4j. Conclusion.

article thumbnail

How to Start Threat Hunting

Palo Alto Networks

Your threat hunters will be more efficient if the data is consistent, structured and flexible for all the ways they want to use it – much of which is driven by auto-tagging using security tools such as a NGFW. The post How to Start Threat Hunting appeared first on Palo Alto Networks Blog. Develop a Hypothesis, Then Test It.

How To 96
article thumbnail

Operational Database Security – Part 1

Cloudera

In this blog post, we are going to take a look at some of the OpDB related security features of a CDP Private Cloud Base deployment. Our Operational Services offerings are also certified for SOC compliance. Apache Atlas-based tags or classifications. This was Part 1 of the Operational Database Security blog post.

article thumbnail

Busted by Cortex XDR: a True Story of Human Intuition and AI

Palo Alto Networks

These analysts are called Unit 42: the global threat intelligence team at Palo Alto Networks that is renowned for their work to hunt, catch and tag threats. We built ML models in Cortex XDR that recognize DGA behavior, as described in detail in a previous blog. We’re Not Done Yet. Read more stories in the Busted by Cortex XDR series.