logo
episode-header-image
Oct 2019
6m 12s

The Case for Security Orchestration Auto...

ePlus, Inc.
About this episode

SOAR is an acronym for Security Orchestration, Automation, and Response. It refers to a system that collects log, event and threat data from numerous sources and provides a single and cohesive view of what’s going on. It also is used to automate responses and corrective actions necessary to keep your network secure. This episode covers how incorporating orchestration and automation can help you.

Up next
Jul 17
ePlus Security + F5 API Security Podcast Series - Episode 2
In this episode, ePlus’ David Tumlin and F5’s Chuck Herrin discuss how securing modern applications isn’t just about tools—it’s about people. Hear how ePlus and F5 are helping organizations break down silos and build secure, scalable systems—together. 
5m 31s
Jun 30
Episode 1: The Evolution of API Security, Shift Left Security and DevSecOps Integration
ePlus Security + F5 API Security Podcast Series where ePlus’ David Tumlin and F5’s Chuck Herrin share why visibility is the foundation of modern security—and how together, ePlus & F5 are helping organizations manage the real challenges of API security in today’s hybrid, multi-clo ... Show More
16m 54s
Jul 2024
ePlus Security Hype Free Zone - Episode 1: Artificial Intelligence
Listen to Lee Waskevich, VP, of Security Strategy at ePlus, dive into the topic of AI on the latest episode of our podcast series: ePlus Security Hype Free Zone. Hosted by Shawn Eftink, Director of Managed Security Services Strategy, this episode provides insight into the evoluti ... Show More
14m 45s
Recommended Episodes
Jun 18
From Inbox to Action: How Supply Chains Are Automating the Mess Away
In this episode of Supply Chain Now, hosts Scott W. Luton and Kevin L. Jackson sit down with Antonio Bustamante, CEO of bem, to explore how automation is reshaping the supply chain landscape in 2025. Together, they unpack the hidden costs of manual workflows, the pitfalls of outd ... Show More
46m 35s
Jul 2024
The Swiss government goes open source (Changelog News #105)
The Switzerland federal government requires releasing its software as open source, Google decides not to deprecate third-party cookies, Mark Zuckerberg says “open source” AI is the path forward, GitHub allows anyone access to deleted / private repository data & Tailscale wants to ... Show More
7m 6s
Dec 2024
incident response (noun) [Word Notes]
Please enjoy this encore episode of Word Notes. A collection of people, process, and technology that provides an organization the ability to detect and respond to cyber attacks. 
7m 50s
Apr 2022
AI Today Podcast: Automation to Intelligence Roadmap Series: What to automate?
For organizations who want to get started on their AI journey, a great first place to start is with automation. However, what exactly do you automate? In this episode of the AI Today podcast hosts Kathleen Walch and Ron Schmelzer discuss how to find automation opportunities in bu ... Show More
41m 53s
Dec 2024
152: Stacc Attack
Jarett Dunn, AKA StaccOverflow, stole millions of dollars from a website called Pump Fun, and he wanted to do it in the most dramatic and theatrical way he could. His big heist is known as the “Stacc Attack”.https://x.com/STACCoverflowHe has a merch store now freestacc.io.Sponsor ... Show More
53m 3s
Jul 2024
572: Data Security Only a Maniac Could Love
Wes' self-decrypting bcachefs disk and a GrapheneOS twist that'll make you ditch your iPhone.Sponsored By:Core Contributor Membership: Take $1 a month of your membership for a lifetime!Tailscale: Tailscale is a programmable networking software that is private and secure by defaul ... Show More
1h 31m
Nov 2024
Gmail adds AI to Summaries and Search Your Emails
Google and Gmail are introducing a new AI integration called Gemini chat, which allows users to interact with their emails. The feature provides options to show unread emails, get the status of recent orders, and ask questions about emails. While some find it useful, others find ... Show More
11m 12s
Aug 2024
148: Dubsnatch
Ever wondered how far a fan would go to get a sneak peek of their favorite artist’s unreleased tracks? In this episode, we uncover the audacious story of some teens bent on getting their hands on the newest dubstep music before anyone else. Sponsors Support for this show comes fr ... Show More
1h 29m
Feb 2025
HN769: CI/CD Pipelines and Network Automation
Continuous Integration / Continuous Deployment (CI/CD) is a framework that developers use to help them manage and integrate frequent code changes. As network automation evolves, should network engineers adopt CI/CD? Guest Tony Bourke joins us to talk about CI/CD pipelines: what t ... Show More
57m 40s
May 7
6 Year Old Sleeper Attack Uncovered, Fake Bank Draft Scam, and Signal Tool Breach
In this episode of Cybersecurity Today, host Jim Love delves into a range of alarming cyber incidents. A six-year sleeper supply chain attack has compromised thousands of e-commerce websites, exploiting vulnerabilities in Magento extensions from vendors Tigren, Meetanshi, and Mag ... Show More
8m 56s