</div>
     </div>
     <div>
        
            <img src="https://www.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/audio-icon.svg" />
        
     </div>
     <div>
        
        <div>
           <div>
              <p>{{interview_audio_title}}</p>
              <div>
                 
                    <i>00:00</i>
                    <i>00:00</i>
                 
                 <div>
                    
                    Volume Slider
                    </div>
                 </div>
                 <div>
                    
                       10s
                    
                    
                       
                       
                    
                    
                       10s
                    
                 </div>
           </div>
           <div>
              
                 10s
              
              
                 
                 
              
              
                 10s
              
           </div>
        </div>
        <div>
              Seek Slider
              
        </div>
     </div>
  </div>

Like legacy security tools, such as traditional firewalls and signature-based antivirus software, organizations that have more traditional (and potentially more vulnerable) SOCs are struggling to keep pace with the increasing volume and sophistication of threats. This challenge is underscored by the fact that approximately 450,000 new malware variants are detected each day, according to data by AV-Test. With such a staggering rate of new threats emerging, traditional SOCs simply cannot keep up using manual analysis and outdated solutions.

As organizations grapple with tedious alerts, staffing challenges and prolonged response times, the need for a new approach to security becomes clear. Enter the concept of an AI-native SOC – a revolutionary approach that promises to transform how we detect, analyze and respond to cybersecurity threats.

In a recent Threat Vector podcast, Unit 42 director of thought leadership, David Moulton, interviewed Kieran Norton, principal at Deloitte & Touche, LLP, a cyber and AI automation leader. They discussed evolving security strategies that support digital transformation and the necessity to keep innovating to stay ahead of threats.

The Limitations of Traditional SOCs

Getting to the heart of the matter, Norton explains one of the challenges faced by traditional SOCs — there is too much data to manage:

Given the volume of data that’s now coming in from the significantly larger attack surface, that old model is starting to show real kinds of issues, one of which is alert fatigue. There are just too many alerts coming in for the SOC to manage.

In the 2024 Cortex Xpanse Attack Surface Threat Report: Lessons in Attack Surface Management from Leading Global Enterprises, Palo Alto Networks outlined some key findings:

  • Attack Surface Change Inevitably Leads to Exposures 

Across industries, attack surfaces are always in a state of flux. The research indicates that, on average, an organization’s attack surface has over 300 new services every month. These additions account for nearly 32% of new high or critical cloud exposures for organizations.

  • Opportunities for Lateral Movement and Data Exfiltration are Abundant

Just three categories of exposures (IT and Networking Infrastructure, Business Operations Applications and Remote Access Services) account for 73% of high-risk exposures across the organizations studied. They can be exploited for lateral movement and data exfiltration.

  • Critical IT and Security Services are Dangerously Exposed to the Internet

Over 23% of exposures involve critical IT and security infrastructure, opening doors to opportunistic attacks. These include vulnerabilities in application-layer protocols, like SNMP, NetBIOS, PPTP and internet-accessible administrative login pages of routers, firewalls, VPNs and other core networking and security appliances.

As such, traditional SOCs struggle with an overwhelming number of alerts, leading to burnout among analysts and increased dwell time for threats.

Embracing AI for Enhanced Security Operations

The AI-native SOC model aims to address these challenges by leveraging artificial intelligence and machine learning to automate routine tasks and enhance threat detection capabilities. As Norton describes:

“We need machines – autopilots – to do a lot of the volume for us and take care of those things that are relatively straightforward that can be automated, that can be addressed through leveraging AI and a lot of other things. And then the analysts are now tuning the machine and making sure the machine is operating as effectively as possible.”

This approach aligns perfectly with Cortex XSIAM’s capabilities, which use AI and ML to automate data integration, analysis and triage, allowing analysts to focus on high-priority incidents.

Real-World Benefits of AI-Native SOCs

The advantages of adopting an AI-native SOC approach are significant. Norton shares a compelling case study:

“We have a client that was seeing over 100,000 alerts a day from their cloud security posture management tool. Through a combination of applying AI/ML to the log aggregation, consolidation, stitching, et cetera, as well as automating the highest volume, most frequently identified alerts in the environment, we were able to carve down the time significantly. We saw a 12x improvement in mean time to resolve. And a 5x improvement in the number of alerts resolved per day.”

This dramatic reduction in alert volume and improved resolution time demonstrates the power of AI in streamlining SOC operations. It’s not just about handling more alerts faster. It’s about fundamentally changing how security teams operate, allowing them to focus on strategic initiatives rather than being overwhelmed by a flood of low-level or low fidelity alerts. This shift can lead to more proactive security measures and a stronger overall defense posture.

Enhancing Threat Intelligence with AI

AI-native SOCs also revolutionize how organizations collect and utilize threat intelligence. Norton explains, “In an AI-native kind of world, you’re using intel and data from your own environment, right? You are finding what you know about your environment, and you are responding with higher degrees of context.”

Cortex XSIAM’s strengths dovetail seamlessly with this strategy. For instance, XSIAM’s AI-driven analytics can automatically identify anomalies specific to an organization’s network behavior, creating a custom threat detection model. Furthermore, XSIAM’s ability to stitch together data from multiple sources (including endpoints, identity, networks and cloud environments) provides a comprehensive view of the security landscape, enabling more accurate and contextual threat intelligence. This “storyline” allows security teams to respond to threats with a deeper understanding of their potential impact on the specific organization, rather than relying solely on generic threat feeds. Looking ahead, Norton predicts an increase in the development and use of bespoke AI models:

“We’re going to see more agents deployed more widely from a cyber perspective. Ultimately, the vision that we’re working toward is to chain together a series of agents that allow us to perform services for clients faster, more effectively, with better outcomes.”

This foresight aligns with Cortex XSIAM’s continuous evolution, powered by Palo Alto Networks Precision AI, to stay ahead of emerging threats.

Embracing AI — A No-Regret Decision

The key difference between an AI-native SOC and a traditional SOC with some AI capabilities is that in an AI-native SOC, AI is fundamental to its operations. It drives most of the initial analysis and decision-making processes. This allows human analysts to focus on more complex, strategic tasks (like threat hunting) that require human judgment and creativity. Norton uses an analogy to explain this:

“Today we have the ability for automated pilots to handle much of the flying process. And we still have a pilot there to handle any abnormalities or things that are unusual, requiring a creative response that you can’t really plan for in advance. Well, we need to get to the same place with the SOC.”

An AI-native SOC is designed to leverage AI and ML technologies:

  • Automate routine tasks and analysis.
  • Process and analyze large volumes of data in real-time.
  • Detect anomalies and potential threats more accurately.
  • Reduce false positives and alert fatigue.
  • Provide more context-rich insights for analysts.
  • Adapt and learn from new threats and patterns over time.

For organizations considering the shift to an AI-native SOC, Norton offers this advice:

“SOC transformation is one of those applications of AI that they’re not going to regret. They can make that decision today. They can start taking action on it. They can transform the SOC. And that’s going to be a no regret decision even though the world of AI is changing very quickly.”

As cyberthreats continue to evolve, the adoption of AI-native SOCs represents a critical step forward in cybersecurity. By leveraging advanced technologies like those offered by Cortex XSIAM, organizations can enhance their threat detection capabilities, streamline operations and stay ahead of emerging risks. The time to embrace AI in security operations is now; it’s a decision that promises significant returns and no regrets.

Are You Ready to Shake up Your SOC?

Cortex XSIAM is the AI-driven security operations platform for the modern SOC, harnessing the power of Precision AI to radically improve security outcomes and transform security operations. Take the XSIAM Product Tour today.

The post Shaking Up Security — The Power of AI-Native SOCs appeared first on Palo Alto Networks Blog.

Article Link: Shaking Up Security — The Power of AI-Native SOCs

1 post – 1 participant

Read full topic

​</div>
</div>
<div>

<img src=”https://www.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/audio-icon.svg” />

</div>
<div>

<div>
<div>
<p>{{interview_audio_title}}</p>
<div>

<i>00:00</i>
<i>00:00</i>

<div>

Volume Slider
</div>
</div>
<div>

10s

10s

</div>
</div>
<div>

10s

10s

</div>
</div>
<div>
Seek Slider

</div>
</div>
</div>

Like legacy security tools, such as traditional firewalls and signature-based antivirus software, organizations that have more traditional (and potentially more vulnerable) SOCs are struggling to keep pace with the increasing volume and sophistication of threats. This challenge is underscored by the fact that approximately 450,000 new malware variants are detected each day, according to data by AV-Test. With such a staggering rate of new threats emerging, traditional SOCs simply cannot keep up using manual analysis and outdated solutions.
As organizations grapple with tedious alerts, staffing challenges and prolonged response times, the need for a new approach to security becomes clear. Enter the concept of an AI-native SOC – a revolutionary approach that promises to transform how we detect, analyze and respond to cybersecurity threats.
In a recent Threat Vector podcast, Unit 42 director of thought leadership, David Moulton, interviewed Kieran Norton, principal at Deloitte & Touche, LLP, a cyber and AI automation leader. They discussed evolving security strategies that support digital transformation and the necessity to keep innovating to stay ahead of threats.
The Limitations of Traditional SOCs
Getting to the heart of the matter, Norton explains one of the challenges faced by traditional SOCs — there is too much data to manage:
Given the volume of data that’s now coming in from the significantly larger attack surface, that old model is starting to show real kinds of issues, one of which is alert fatigue. There are just too many alerts coming in for the SOC to manage.
In the 2024 Cortex Xpanse Attack Surface Threat Report: Lessons in Attack Surface Management from Leading Global Enterprises, Palo Alto Networks outlined some key findings:

Attack Surface Change Inevitably Leads to Exposures 

Across industries, attack surfaces are always in a state of flux. The research indicates that, on average, an organization’s attack surface has over 300 new services every month. These additions account for nearly 32% of new high or critical cloud exposures for organizations.

Opportunities for Lateral Movement and Data Exfiltration are Abundant

Just three categories of exposures (IT and Networking Infrastructure, Business Operations Applications and Remote Access Services) account for 73% of high-risk exposures across the organizations studied. They can be exploited for lateral movement and data exfiltration.

Critical IT and Security Services are Dangerously Exposed to the Internet

Over 23% of exposures involve critical IT and security infrastructure, opening doors to opportunistic attacks. These include vulnerabilities in application-layer protocols, like SNMP, NetBIOS, PPTP and internet-accessible administrative login pages of routers, firewalls, VPNs and other core networking and security appliances.
As such, traditional SOCs struggle with an overwhelming number of alerts, leading to burnout among analysts and increased dwell time for threats.
Embracing AI for Enhanced Security Operations
The AI-native SOC model aims to address these challenges by leveraging artificial intelligence and machine learning to automate routine tasks and enhance threat detection capabilities. As Norton describes:
“We need machines – autopilots – to do a lot of the volume for us and take care of those things that are relatively straightforward that can be automated, that can be addressed through leveraging AI and a lot of other things. And then the analysts are now tuning the machine and making sure the machine is operating as effectively as possible.”
This approach aligns perfectly with Cortex XSIAM’s capabilities, which use AI and ML to automate data integration, analysis and triage, allowing analysts to focus on high-priority incidents.
Real-World Benefits of AI-Native SOCs
The advantages of adopting an AI-native SOC approach are significant. Norton shares a compelling case study:
“We have a client that was seeing over 100,000 alerts a day from their cloud security posture management tool. Through a combination of applying AI/ML to the log aggregation, consolidation, stitching, et cetera, as well as automating the highest volume, most frequently identified alerts in the environment, we were able to carve down the time significantly. We saw a 12x improvement in mean time to resolve. And a 5x improvement in the number of alerts resolved per day.”
This dramatic reduction in alert volume and improved resolution time demonstrates the power of AI in streamlining SOC operations. It’s not just about handling more alerts faster. It’s about fundamentally changing how security teams operate, allowing them to focus on strategic initiatives rather than being overwhelmed by a flood of low-level or low fidelity alerts. This shift can lead to more proactive security measures and a stronger overall defense posture.
Enhancing Threat Intelligence with AI
AI-native SOCs also revolutionize how organizations collect and utilize threat intelligence. Norton explains, “In an AI-native kind of world, you’re using intel and data from your own environment, right? You are finding what you know about your environment, and you are responding with higher degrees of context.”
Cortex XSIAM’s strengths dovetail seamlessly with this strategy. For instance, XSIAM’s AI-driven analytics can automatically identify anomalies specific to an organization’s network behavior, creating a custom threat detection model. Furthermore, XSIAM’s ability to stitch together data from multiple sources (including endpoints, identity, networks and cloud environments) provides a comprehensive view of the security landscape, enabling more accurate and contextual threat intelligence. This “storyline” allows security teams to respond to threats with a deeper understanding of their potential impact on the specific organization, rather than relying solely on generic threat feeds. Looking ahead, Norton predicts an increase in the development and use of bespoke AI models:
“We’re going to see more agents deployed more widely from a cyber perspective. Ultimately, the vision that we’re working toward is to chain together a series of agents that allow us to perform services for clients faster, more effectively, with better outcomes.”
This foresight aligns with Cortex XSIAM’s continuous evolution, powered by Palo Alto Networks Precision AI, to stay ahead of emerging threats.
Embracing AI — A No-Regret Decision
The key difference between an AI-native SOC and a traditional SOC with some AI capabilities is that in an AI-native SOC, AI is fundamental to its operations. It drives most of the initial analysis and decision-making processes. This allows human analysts to focus on more complex, strategic tasks (like threat hunting) that require human judgment and creativity. Norton uses an analogy to explain this:
“Today we have the ability for automated pilots to handle much of the flying process. And we still have a pilot there to handle any abnormalities or things that are unusual, requiring a creative response that you can’t really plan for in advance. Well, we need to get to the same place with the SOC.”
An AI-native SOC is designed to leverage AI and ML technologies:

Automate routine tasks and analysis.
Process and analyze large volumes of data in real-time.
Detect anomalies and potential threats more accurately.
Reduce false positives and alert fatigue.
Provide more context-rich insights for analysts.
Adapt and learn from new threats and patterns over time.

For organizations considering the shift to an AI-native SOC, Norton offers this advice:
“SOC transformation is one of those applications of AI that they’re not going to regret. They can make that decision today. They can start taking action on it. They can transform the SOC. And that’s going to be a no regret decision even though the world of AI is changing very quickly.”
As cyberthreats continue to evolve, the adoption of AI-native SOCs represents a critical step forward in cybersecurity. By leveraging advanced technologies like those offered by Cortex XSIAM, organizations can enhance their threat detection capabilities, streamline operations and stay ahead of emerging risks. The time to embrace AI in security operations is now; it’s a decision that promises significant returns and no regrets.
Are You Ready to Shake up Your SOC?
Cortex XSIAM is the AI-driven security operations platform for the modern SOC, harnessing the power of Precision AI to radically improve security outcomes and transform security operations. Take the XSIAM Product Tour today.
The post Shaking Up Security — The Power of AI-Native SOCs appeared first on Palo Alto Networks Blog.
Article Link: Shaking Up Security — The Power of AI-Native SOCs
1 post – 1 participant
Read full topic