{"id":8469,"date":"2021-11-18T17:23:14","date_gmt":"2021-11-18T16:23:14","guid":{"rendered":"https:\/\/www.show.it?p=8469"},"modified":"2021-11-19T11:12:22","modified_gmt":"2021-11-19T10:12:22","slug":"acronyms-aside-soc-future-needs-these-3-capabilities","status":"publish","type":"post","link":"https:\/\/www.show.it\/en\/acronyms-aside-soc-future-needs-these-3-capabilities\/","title":{"rendered":"Acronyms Aside, the SOC of the Future Needs These 3 Capabilities"},"content":{"rendered":"<div>\n<p><span style=\"font-size: medium;\"><span style='font-family: \"trebuchet ms\", geneva;'>Every discipline has its acronyms, but I\u2019d venture to say cybersecurity has more than its share. We use them to describe threat actors and how they operate, as well as different security teams, their certifications and the tools they use. There\u2019s nothing wrong with acronyms, but when they are used to describe emerging solutions, an interesting phenomenon occurs\u2026that new acronym becomes the next silver bullet technology that will solve all our security problems.<\/span><\/span><\/p>\n<p><a href=\"https:\/\/www.securityweek.com\/acronyms-aside-soc-future-needs-these-3-capabilities\" target=\"_blank\" rel=\"noopener\">read more<\/a><\/p>\n<div class=\"feedflare\">\n<a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=kBVYuLnSqZE:fieDbzXz8dE:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?d=yIl2AUoC8zA\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=kBVYuLnSqZE:fieDbzXz8dE:-BTjWOF_DHI\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?i=kBVYuLnSqZE:fieDbzXz8dE:-BTjWOF_DHI\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=kBVYuLnSqZE:fieDbzXz8dE:dnMXMwOfBR0\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?d=dnMXMwOfBR0\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=kBVYuLnSqZE:fieDbzXz8dE:V_sGLiPBpWU\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?i=kBVYuLnSqZE:fieDbzXz8dE:V_sGLiPBpWU\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=kBVYuLnSqZE:fieDbzXz8dE:qj6IDK7rITs\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?d=qj6IDK7rITs\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=kBVYuLnSqZE:fieDbzXz8dE:gIN9vFwOqvQ\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?i=kBVYuLnSqZE:fieDbzXz8dE:gIN9vFwOqvQ\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=kBVYuLnSqZE:fieDbzXz8dE:TzevzKxY174\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?d=TzevzKxY174\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=kBVYuLnSqZE:fieDbzXz8dE:F7zBnMyn0Lo\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?i=kBVYuLnSqZE:fieDbzXz8dE:F7zBnMyn0Lo\" border=\"0\"><\/a>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Every discipline has its acronyms, but I\u2019d venture to say cybersecurity has more than its share. We use them to describe threat actors and how they operate, as well as different security teams, their certifications and the tools they use. There\u2019s nothing wrong with acronyms, but when they are used to describe emerging solutions, an [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[39,35],"tags":[],"class_list":["post-8469","post","type-post","status-publish","format-standard","hentry","category-industry-insights","category-security-infrastructure"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/posts\/8469","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/comments?post=8469"}],"version-history":[{"count":0,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/posts\/8469\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/media?parent=8469"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/categories?post=8469"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/tags?post=8469"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}