Normal view

There are new articles available, click to refresh the page.
Today — 12 May 2026Main stream

Is The SOC Obsolete, And We Just Haven’t Admitted It Yet?

12 May 2026 at 07:00

Many AI-first enterprises have already embraced sovereign architectures for general AI initiatives; cybersecurity—and the SOC—should be next.

The post Is The SOC Obsolete, And We Just Haven’t Admitted It Yet? appeared first on SecurityWeek.

Before yesterdayMain stream

When the SOC Goes to Deadwood: A Night to Remember 

By: BHIS
4 February 2026 at 09:00

Hear a tale about the time the BHIS SOC team conducted a 14-hour overnight incident response... from the Wild West Hackin' Fest conference in Deadwood, South Dakota.

The post When the SOC Goes to Deadwood: A Night to Remember  appeared first on Black Hills Information Security, Inc..

Intel Core Ultra 3 Series

6 January 2026 at 04:00
Intel has a lot riding on any announcement it makes these days, so its presentation about the new Core Ultra 3 Series processors at CES 2026, which began yesterday, is of importance. 14 models were introduced covering a wide range of configurations. These new chips have the Panther Lake architecture, and all are intended for […]

The Curious Case of the Comburglar

By: BHIS
18 December 2025 at 12:55

By Troy Wojewoda During a recent Breach Assessment engagement, BHIS discovered a highly stealthy and persistent intrusion technique utilized by a threat actor to maintain Command-and-Control (C2) within the client’s […]

The post The Curious Case of the Comburglar appeared first on Black Hills Information Security, Inc..

Inside the BHIS SOC: A Conversation with Hayden Covington 

By: BHIS
3 December 2025 at 09:00

What happens when you ditch the tiered ticket queues and replace them with collaboration, agility, and real-time response? In this interview, Hayden Covington takes us behind the scenes of the BHIS Security Operations Center, which is where analysts don’t escalate tickets, they solve them.

The post Inside the BHIS SOC: A Conversation with Hayden Covington  appeared first on Black Hills Information Security, Inc..

The Detection Engineering Process

By: BHIS
18 November 2024 at 11:00

This webcast was originally published on November 8, 2024. In this video, Hayden Covington discusses the detection engineering process and how to apply the scientific method to improve the quality […]

The post The Detection Engineering Process appeared first on Black Hills Information Security, Inc..

Monitoring High Risk Azure Logins 

By: BHIS
12 September 2024 at 10:44

Recently in the SOC, we were notified by a partner that they had a potential business email compromise, or BEC. We commonly catch these by identifying suspicious email forwarding rules, […]

The post Monitoring High Risk Azure Logins  appeared first on Black Hills Information Security, Inc..

❌
❌