• About Us
  • Contact Us
  • Terms & Conditions
  • Privacy Policy
Technology Hive
  • Home
  • Technology
  • Artificial Intelligence (AI)
  • Cyber Security
  • Machine Learning
  • More
    • Deep Learning
    • AI in Healthcare
    • AI Regulations & Policies
    • Business
    • Cloud Computing
    • Ethics & Society
No Result
View All Result
  • Home
  • Technology
  • Artificial Intelligence (AI)
  • Cyber Security
  • Machine Learning
  • More
    • Deep Learning
    • AI in Healthcare
    • AI Regulations & Policies
    • Business
    • Cloud Computing
    • Ethics & Society
No Result
View All Result
Technology Hive
No Result
View All Result
Home Cyber Security

Forcing the SOC to Change Its Approach

Adam Smith – Tech Writer & Blogger by Adam Smith – Tech Writer & Blogger
February 25, 2025
in Cyber Security
0
Forcing the SOC to Change Its Approach
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter

Alert Fatigue: The Next Step in Threat Detection

Alert fatigue has long been a major issue for security analysts tasked with manning the Security Operations Center (SOC). False positives account for a fifth of all alerts in the SOC, according to a recent report, and can seriously deplete resources, impacting the efficiency and morale of the security team.

Detection Failures

At the same time, we’re seeing threats that don’t trigger alerts. Modern attacks can propagate through organizations by using the features of operating systems. Living off the Land Binaries and Scripts (LOLBAS), which don’t introduce any code into the system and can pivot within the network without the need to use any tools, are notoriously difficult to detect.

New Approach to Detection

To address these issues, we need to take a new approach to detection in the SOC that takes the pressure off the analyst and looks at alerts not consecutively but as part of a wider pattern of events. The human brain would struggle to do that, but AI now allows us to address this type of problem by taking a whole new approach to the problem.

AI, but not as you know it

Make no mistake, we are not talking about the application of AI in the usual sense when it comes to threat detection. Up until now, AI has seen Large Language Models (LLMs) used to do little more than summarize findings for reporting purposes in incident response. Instead, we are referring to the application of AI in its truer and broader sense, i.e. via machine learning, agents, graphs, hypergraphs, and other approaches – and these promise to make detection both more precise and intelligible.

Augmenting the Analyst

The end result is that the security analyst is no longer perpetually caught in firefighting mode. Rather than having to respond to hundreds of alerts a day, the analyst can use the hypergraphs and AI to detect and string together long chains of alerts that share commonalities and in so doing gain a complete picture of the threat. Realistically, it’s expected that adopting such an approach should see alert volumes decline by up to 90%.

Conclusion

By applying machine learning to the chains of events, it will be possible to prioritize response, identifying which threats require immediate triage. Generative AI can then offer the analyst a number of courses of action to remediate the threat, ensuring incident response is consistent and proportionate.

Frequently Asked Questions

  • What is the primary issue with current threat detection methods?
    • Alert fatigue, with false positives accounting for a fifth of all alerts in the SOC.
  • What is the solution to this issue?
    • A new approach to detection in the SOC that takes the pressure off the analyst and looks at alerts not consecutively but as part of a wider pattern of events.
  • What role does AI play in this solution?
    • AI is used to detect and string together long chains of alerts that share commonalities, allowing the analyst to gain a complete picture of the threat.

Read More

  • How to Build a Security Operations Center (on a Budget) – Get All 5 Chapters of AlienVault’s How to Build a Security Operations Center (On a Budget) in 1 eBook!
Previous Post

Alibaba Cloud Expands Thai Presence with Second Data Centre

Next Post

DeepSeek Ban? China Data Transfer Boosts Security Concerns

Adam Smith – Tech Writer & Blogger

Adam Smith – Tech Writer & Blogger

Adam Smith is a passionate technology writer with a keen interest in emerging trends, gadgets, and software innovations. With over five years of experience in tech journalism, he has contributed insightful articles to leading tech blogs and online publications. His expertise covers a wide range of topics, including artificial intelligence, cybersecurity, mobile technology, and the latest advancements in consumer electronics. Adam excels in breaking down complex technical concepts into engaging and easy-to-understand content for a diverse audience. Beyond writing, he enjoys testing new gadgets, reviewing software, and staying up to date with the ever-evolving tech industry. His goal is to inform and inspire readers with in-depth analysis and practical insights into the digital world.

Related Posts

Predicting and Quantifying the Threat
Cyber Security

Predicting and Quantifying the Threat

by Adam Smith – Tech Writer & Blogger
March 6, 2025
Tech Nation’s Cyber Security Cohort
Cyber Security

Tech Nation’s Cyber Security Cohort

by Adam Smith – Tech Writer & Blogger
March 6, 2025
AI Companies Help Businesses Beat Competition
Cyber Security

AI Companies Help Businesses Beat Competition

by Adam Smith – Tech Writer & Blogger
March 5, 2025
DHS AI Roadmap Prioritizes Cybersecurity and National Safety
Cyber Security

DHS AI Roadmap Prioritizes Cybersecurity and National Safety

by Adam Smith – Tech Writer & Blogger
March 5, 2025
AI in Cyber Security: A Necessity or Too Early to Introduce?
Cyber Security

AI in Cyber Security: A Necessity or Too Early to Introduce?

by Adam Smith – Tech Writer & Blogger
March 4, 2025
Next Post
DeepSeek Ban? China Data Transfer Boosts Security Concerns

DeepSeek Ban? China Data Transfer Boosts Security Concerns

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Articles

Revolutionizing Healthcare through AI

Revolutionizing Healthcare through AI

April 9, 2025
AI Financial Planning Should Focus on Short-Term Goals

AI Financial Planning Should Focus on Short-Term Goals

April 2, 2025
UK hospitals begin live trial of prostate cancer-detecting AI

UK hospitals begin live trial of prostate cancer-detecting AI

March 2, 2025

Browse by Category

  • AI in Healthcare
  • AI Regulations & Policies
  • Artificial Intelligence (AI)
  • Business
  • Cloud Computing
  • Cyber Security
  • Deep Learning
  • Ethics & Society
  • Machine Learning
  • Technology
Technology Hive

Welcome to Technology Hive, your go-to source for the latest insights, trends, and innovations in technology and artificial intelligence. We are a dynamic digital magazine dedicated to exploring the ever-evolving landscape of AI, emerging technologies, and their impact on industries and everyday life.

Categories

  • AI in Healthcare
  • AI Regulations & Policies
  • Artificial Intelligence (AI)
  • Business
  • Cloud Computing
  • Cyber Security
  • Deep Learning
  • Ethics & Society
  • Machine Learning
  • Technology

Recent Posts

  • Best Practices for AI in Bid Proposals
  • Artificial Intelligence for Small Businesses
  • Google Generates Fake AI Podcast From Search Results
  • Technologies Shaping a Nursing Career
  • AI-Powered Next-Gen Services in Regulated Industries

Our Newsletter

Subscribe Us To Receive Our Latest News Directly In Your Inbox!

We don’t spam! Read our privacy policy for more info.

Check your inbox or spam folder to confirm your subscription.

© Copyright 2025. All Right Reserved By Technology Hive.

No Result
View All Result
  • Home
  • Technology
  • Artificial Intelligence (AI)
  • Cyber Security
  • Machine Learning
  • AI in Healthcare
  • AI Regulations & Policies
  • Business
  • Cloud Computing
  • Ethics & Society
  • Deep Learning

© Copyright 2025. All Right Reserved By Technology Hive.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?