security data pipeline
Automate Security Executive Dashboards on Power BI: How to Architect the Data pipeline

In the backend of security operations, one of the recurring challenges for security teams is automating Power BI dashboards to provide continuous, real-time insights from siloed data sources. While creating a dashboard from an Excel spreadsheet is straightforward, achieving automation from data collection to visualization involves a more sophisticated approach. This blog post delves into

cloud and on premise integration for seamless automation
Seamless Cloud and on-premise integration for security automation

As more and more security teams adopt cloud-based security automation tools like DTonomy, it’s increasingly common for security analysts to encounter situations where they need to integrate cloud products with on-premises products to achieve end-to-end automation. Many on-premises software products provide REST APIs for programmatic access but are only accessible within the LAN (Local Area

DTonomy & LexisNexis: AI-driven Innovation in Security Operations

Introduction: The ever-evolving landscape of cybersecurity presents continuous challenges for large organizations. DTonomy’s recent collaboration with LexisNexis, a major player in the legal services industry, serves as a shining example of overcoming these challenges. As highlighted in their feedback on G2.com, LexisNexis experienced a remarkable transformation in their security operations post-implementation of DTonomy’s solutions. The

chatgpt for msp
ChatGPT-Enabled MSP Business Growth: 6 Innovative Approaches to Consider

Managed Service Providers (MSPs) offer crucial IT services and support to a wide range of clients. With the advent of ChatGPT, MSPs now have a chance to expand their business in innovative and previously unseen ways. ChatGPT has the potential to revolutionize both the lead generation process and the service delivery experience. On the business

GPT for cyber security
6 ChatGPT Use Cases for Streamlining Security Operations

As a highly capable AI language model, ChatGPT has the potential to revolutionize the way security teams approach their daily tasks. In this blog, we explore six creative ways that ChatGPT can assist and enhance the work of cybersecurity professionals, making their job easier and more effective. 1. Simplify SIEM Query Writing with ChatGPT With

cyber security dashboard
Cyber Security Dashboard

A cybersecurity dashboard is a graphical user interface that displays real-time data about the security of an organization’s network and systems. It typically includes a collection of metrics, charts, and other visualizations that provide a high-level view of an organization’s cybersecurity posture. The dashboard may include information about the number of attacks, the types of

phishing test
How to run an effective phishing test?

Phishing attacks are a common method used by hackers to gain access to sensitive information, and they can be very difficult to detect. By conducting regular phishing tests, organizations can help protect themselves against these attacks by identifying and addressing any vulnerabilities in their employees’ security knowledge and practices. To run an effective phishing test,

synchronize your siloed tools with connectwise
Synchronize siloed security services with ConnectWise

MSPs & ConnectWise ConnectWise Manage is a popular professional service automation(PSA) software that MSPs (managed service providers) use to manage the services they are offering. It has covered many aspects of running an MSP including sales/marking/contract management/finance/project/ticket etc. all in one place. As more and more MSPs start offering cybersecurity services,  a few things may

Create vulnerability summary report using Power BI

A vulnerability scanner enables organizations to monitor their networks, systems, and applications for security vulnerabilities. Most security teams utilize vulnerability scanners to find weaknesses in their environment and make sure preventive actions are taken properly beforehand. The number of vulnerabilities in IT systems is growing fast every day. Over 8,000 vulnerabilities are reported in Q1

6 things you should include in your client security dashboard

  Client dashboards and reports are important to the community and the business value. When creating such metrics/dashboards, what is the strategy that can maximize your values? What kind of metrics you should include in your dashboard? Typically the report is mostly sent to a manager in your clients, so the information has to be

shadow server
Open ports? Detect and respond with automation!

Hackers are constantly scanning networks and trying to get in via vulnerability exposed via open ports. Therefore, it is important to understand what are the open ports within your network and how to deal with them if there are any open ports. Some ports are required to open for providing service and some are needed

We are pleased to announce that DTonomy is now part of Stellar Cyber. The integrated solution will enhance cyber threat detection and response automation!

X