Historical data analysis in security operations: the role of retrospective search

This essay was written by Sergey Soldatov, Kaspersky’s Head of Security Operations Center. It explores the unique role of threat hunting in detecting advanced persistent threats (APTs) that evade automated security solutions, positioning it as a critical component of a modern SOC’s detection and response strategy. Drawing from real-world detection practices, it outlines how threat hunting complements alert-driven SOC operations through retrospective analysis and hypothesis-driven investigation, using telemetry data such as EDR/NDR logs.
mehr

Optimizing SOC operations with tailored playbooks: features of effective playbook development

Many scenarios that teams encounter in a security operations center (SOC) eventually resurface, like waves returning to shore. They may look unique, but the underlying patterns are the same. SOC playbooks, which are step-by-step instructions tied to incident categories, are labor-saving tools that help you address these scenarios. A playbook gives analysts a clear path forward under time and pressure constraints. It shouldn’t be confused, however, with an incident response (IR) plan, which is the blueprint that defines an organization’s hig...
mehr

A New Era of Energy Efficiency – Innovations for Today and Tomorrow

Step into the future of energy efficiency. Explore how AI, smart systems, and innovative financial models are reshaping sustainability and performance for tomorrow’s buildings. Download the paper now! Energy efficiency is no longer optional—it’s essential. As energy prices rise and budgets shrink, organizations need smarter strategies to reduce consumption, control costs, and cut emissions. This paper details: • Smart controls that optimize building system operations for maximum efficiency • Data analytics to identify rising energy and main...
mehr

Counter-Drone Defense: Engineering the Shield Against UAV Threats

Explore how engineers can design modular, multi-layered counter-UAS architectures to detect, track, and neutralize aerial threats, backed by traceable supply chains, and lifecycle programs for mission-ready defense systems. Remote-Controlled and Unmanned Systems are revolutionizing battlefield dynamics. Neutralizing these threats demands layered, modular, and adaptable defense solutions. This whitepaper explores a comprehensive solution for counter-UAS applications, including detection, electronic warfare, directed energy, and kinetic inter...
mehr

The State of Human Risk 2025 — Securing Your Workforce in the AI Era

The workplace is transforming at an unprecedented pace. As organisations embrace AI agents working alongside human employees, cybersecurity leaders face a critical challenge: how do you manage behavioural risk when your workforce now includes both people and intelligent systems? Our latest global research surveyed 4,200 professionals across 14 countries to uncover the reality of this new paradigm. The findings reveal a complex threat landscape where traditional human vulnerabilities—targeted attacks, mistakes, and intentional data exfiltrat...
mehr