Swimlane
ZeroFOX launches App Library to provide integrated external threat intelligence and protection
ZeroFOX announced the release of the largest App Library enabling security teams to streamline their response to external threats through effective threat intelligence …
Cybersixgill Darkfeed available through Swimlane’s security automation platform
Cybersixgill announced that Darkfeed will be available through Swimlane‘s security automation platform. Now, Swimlane users can enhance their threat research and …

How do I select a SOAR solution for my business?
Security Orchestration, Automation and Response (SOAR) products offer an appealing solution, promising efficiencies in detecting and responding to threats. However, …
Swimlane raises $40M to accelerate partnerships and alliances, expand research and development
Swimlane announced it has raised $40 million in funding led by EIP. This funding will accelerate partnerships and alliances, expand research and development, and enable …
Swimlane Analyst Hub: Increasing access to educational content and open-source tools
Swimlane, an industry leader in security orchestration, automation and response (SOAR) announced the launch of the Swimlane Analyst Hub as a way to aggregate its open-source …
Swimlane acquires Syncurity to spur growth and affirm commitment to SOAR market
Swimlane, an independent leader in security orchestration, automation and response (SOAR), announced the acquisition of Syncurity, an organization focused on security incident …

While many migrate security tools to the cloud, concerns remain
While many companies are beginning to migrate security tools to the cloud, a significant number have concerns, a survey by Exabeam reveals. The survey highlights data privacy, …

Organizations struggle with patching endpoints against critical vulnerabilities
Less than 50 percent of organizations can patch vulnerable systems swiftly enough to protect against critical threats and zero-day attacks, and 81 percent have suffered at …

Too many alarms and too few security analysts? Think SOAR
Security automation, orchestration and response (SOAR) speeds up the incident response process by replacing manual tasks with automated workflows. We sat down with Swimlane …

Unplanned work makes it hard to deliver digital transformation
Time-critical, unplanned work caused by IT disruptions continues to plague enterprises around the world, leading to lost revenue, significant employee morale problems and …

eBook: Automating Incident Response
This 17-page e-book examines the increasing pressures faced by cybersecurity teams, risks of ineffective alert triage and new automation capabilities that dramatically improve …

Swimlane’s SOAR solution is patented for its many security posture combinations and use cases
Swimlane, a leader in security orchestration, automation and response (SOAR), announced it has been granted US Patent 10,552,615, “Threat Response Systems and Methods,” by the …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility