logo

NJP

SecOps blog

Import · Jul 11, 2023 · article

Join us at ServiceNow's headquarters in Santa Clara, California for our first Connect Security Symposium for Security Operations customers on September 24th and 25th! View more agenda details and regi...

[image

There is nothing better than an instructor-led ServiceNow course. We cover the material in the on-demand course and then usually go a little further. We explore questions presented by students. We tal...

[image

Jan Spurlin ServiceNow Employee

Native Sidebar chat Using Sidebar, security analysts can collaborate with others in real-time based on a Workspace task-based or interaction-based record. These Sidebar discussions facilitate the exch...

[image

Hareesh Namavar ServiceNow Employee

Imagine your code base as a sprawling city. It's bustling with activity, constantly growing and evolving. But just like any city, it has vulnerabilities – hidden alleyways where attackers could sneak ...

[image

lanemclaughlin ServiceNow Employee

Join us at ServiceNow's headquarters in Santa Clara, California for our first Connect Security Symposium for Security Operations customers on September 24th and 25th! View more agenda details and regi...

[image

There is nothing better than an instructor-led ServiceNow course. We cover the material in the on-demand course and then usually go a little further. We explore questions presented by students. We tal...

[image

Jan Spurlin ServiceNow Employee

Shift handover feature: The purpose of a shift handover feature in a SOC is to ensure seamless transition of responsibilities, information, and ongoing tasks between different shifts or security analy...

[image

Hareesh Namavar ServiceNow Employee

TISC is GA now!! We are excited to announce that Threat Intelligence Security Center (TISC), ServiceNow's Threat Intelligence Platform, was released as GA on 9th May, 2024!!. Here's more about the pro...

[image

Kalyan8 ServiceNow Employee

With the 2024 Washington D.C. release come various exciting updates to our Security Operations offering. Notably, the introduction of Security Posture Control to our suite of applications. Security Po...

[image

lanemclaughlin ServiceNow Employee

We bring you exciting news!! Threat Intelligence Security Center (TISC), the new Threat Intelligence Platform from ServiceNow, was successfully released in cGTM (Controlled Go-To-Market) mode on Febru...

[image

Kalyan8 ServiceNow Employee

Dear SecOps Community Members, On December 7th, 2023 we presented a webinar on Major Security Incident Management (MSIM) - Tips for Successful Deployment. For those of you who could not make it, we co...

[image

AntonioChallita ServiceNow Employee

What's New in Vancouver for ServiceNow Security Operations Products ServiceNow's Security Operations suite is expanding with new innovations in the Vancouver release. There are a few notable upgrades ...

[image

lanemclaughlin ServiceNow Employee

We have released the first beta of Threat Intelligence Security Centre, our new Threat Intelligence Platform product. If you are interested to enrol in our DPP (Design Partnership Program) and validat...

[image

Kalyan8 ServiceNow Employee

In today's digital landscape, vulnerabilities have become a serious and long-standing concern. However, log4j has elevated this risk to another level, posing a significant threat to business reputatio...

[image

Ravi Kanukollu ServiceNow Employee

Introduction Security Posture Control is a new product that was launched on ServiceNow store on August 3rd, 2023. We are looking for early adopter customers who can test this product in their sub-prod...

[image

Gopi37 ServiceNow Employee

Security is more important than ever. But implementing top security measures across a large, complex company is not easy. At ServiceNow, we use our own security products to protect our customers and o...

[image

Mary Hain ServiceNow Employee


Page 2

What is a Zero-Day Vulnerability? The term "zero-day" refers to the fact that the vendor or developer has only just learned of the flaw which means they have “zero days” to fix it. A zero-day attack t...

[image

Mike Plavin ServiceNow Employee

A zero trust security policy presumes that any connection to a corporate network or system cannot be trusted. How do you set one a zero trust network on the platform that ensures data access is secure...

[image

Mary Hain ServiceNow Employee

Security Incident Response Workspace With Utah, the SIR Workspace has a flexible and reimagined user experience. Designed with Tier 1 and 2 security analysts in mind, it includes all new analyst dashb...

[image

Jon Williams ServiceNow Employee

Do you want to help improve ServiceNow’s Security Products and Experiences? If so, sign up to join us for user research here! We collect feedback throughout the year to make sure we’re building and im...

[image

David352 ServiceNow Employee

The Knowledge 23 conference is just around the corner and exciting things are happening! Check out the Knowledge site: spr.ly/611093SqaX A couple of things you will want to know... We are offering pre...

[image

Jan Spurlin ServiceNow Employee

Summary Workspaces offer a single pane view of the work to be done and let the users multi-task from within the same pane boosting their productivity. Vulnerability Response Workspaces are now availab...

[image

sivamallu ServiceNow Employee

We are happy to announce the CISA KEV BOD (22-01) integration in the Vulnerability Response application. In a timely manner, you can now easily track, prioritise (allows risk-based prioritisation) and...

[image

Sarath S ServiceNow Employee

Traditional cyber controls simply can’t keep pace with the speed, scale, and complexity of digital business. Cybersecurity needs to be a business imperative managed through cross-functional collaborat...

[image

Mary Hain ServiceNow Employee

Hey guys - I am scheduled to teach Vulnerability Response Implementation next week - Thursday/Friday July 21-22 (US Central Time zone) and the class is not full... Registration for this class will be ...

[image

Jan Spurlin ServiceNow Employee

Learn about how Operational Technology (OT) assets can be added to the CMDB and OT vulnerabilities detected and remediated by using the integrations between Microsoft's Defender for IoT platform and S...

[image

bradley_owen ServiceNow Employee

Operational technology is the heartbeat of manufacturing... ... and it's becoming more advanced and complex every year. The Industrial Internet of Things (lloT) and Industry 4.0 are driving digitizati...

[image

Steven16 ServiceNow Employee

Cyber incidents rose sharply between 2020 and 2021, with organizations averaging nearly 25 attacks last year. How can businesses protect themselves while digitizing their operations and business model...

[image

Mary Hain ServiceNow Employee

Now on Now: Check out the Knowledge playlist of Security sessions This year at Knowledge starting May 11, ServiceNow practitioners will share a variety of stories describing how we use the Now Platfor...

[image

Mary Hain ServiceNow Employee

We are pleased to announce that our full portfolio of Now Learning instructor-led courses is available beginning this month in an on-demand format. With the two April releases outlined below, you will...

[image

Jan Spurlin ServiceNow Employee


Page 3

Escalating cyber risk and targeted attacks are mainstream discussions for boards, regulators, the C-suite, and customers. ServiceNow is proud to announce major updates to our Security Operations portf...

[image

Karl Klaessig ServiceNow Employee

Vulnerability managers and IT asset and remediation managers have a common enemy: exploitable and vulnerable systems. With the latest releases, a reimagined user experience and new integrations will h...

[image

Karl Klaessig ServiceNow Employee

The October 2021 store release for ServiceNow® Security Operations includes a number of new features for Vulnerability Response, including a brand-new user experience. New user experience for Vulnerab...

[image

janenec ServiceNow Employee

Hey guys - I will be teaching the Rome Vulnerability Response Implementation class next week starting on Thursday, October 7th. This is a two day class. Currently there are several seats that are open...

[image

Jan Spurlin ServiceNow Employee

This exciting release includes cloud SIEM and threat intelligence integrations and expands our support of Application VR and tenable findings. In this release, we have focused on addressing three main...

[image

Karl Klaessig ServiceNow Employee

Hi everyone! I just learned about an upcoming session on ransomware that I think many of you here would be interested in. Ransomware has grown from a minor threat to individuals to a major threat for ...

[image

Alex Cox ServiceNow Employee

zScaler and ServiceNow have teamed up to give joint customers the ability to leverage zScaler Internet Access and Threat intelligence with the workflow and automation capabilities of ServiceNow Securi...

[image

MarthaG ServiceNow Employee

How ServiceNow Can Help Reduce the Exposure and Impact of Ransomware As ransomware continues to be a persistent threat to all industry verticals, ServiceNow® has the capabilities to help customers min...

[image

Mike Plavin ServiceNow Employee

The ServiceNow® Vulnerability Response application is a powerful way for organizations to track, prioritize, and resolve vulnerabilities. However, depending on data from vulnerability scanning process...

[image

Eric Paxton Kilo Explorer

Did you ever wonder how SecOps SIR & ITSM work together? See the following demo on how the effective collaboration between Security & IT helps improve Cyber Resilience!

[image

Sebastiaan ServiceNow Employee

Check out Dengene's innovative bottom-up approach to assigning Vulnerable Items and grouping them, all using advanced third-party Artificial Intelligent (AutoML) solution. Our solution allows you to g...

[image

Your network is under a phishing or malware attack - you need to know: When did this attack first occur?Is the attack on-going?How many times have malicious observables been recorded in the logs?Which...

[image

Dawn Jurek ServiceNow Employee

All it takes is one click... Any user in your organization accidentally clicking a malicious link in an email could compromise your entire network. If you have the Security Incident Response applicati...

[image

Dawn Jurek ServiceNow Employee

Security Operations Session, New York City Now Summit on November 13, 2018 At the Now Summit in New York City on November 13, 2018, Mark Sutton from Bain Capital sat down with attendees for a Q&A sess...

[image

Keith Reynolds ServiceNow Employee


Page 4

“The Customer Success Team and the Development team are really great to work with and interested in improving the product. If you don’t think the product can do something you want it to do, they reall...

[image

Keith Reynolds ServiceNow Employee

Managing the Risk Management Framework (RMF) can be a daunting task, even with documentation! And, especially so, if you are not sure where you are in the six-step process: CategorizeSelectImplementAs...

[image

Lisa Latour Administrator

The Gartner Security & Risk Management Summit is on in National Harbor, MD this week. Monday's keynote opened with how organizations can go from being overwhelmed (by a lack of staff, too much securit...

[image

janenec ServiceNow Employee

How are you responding to and remediating vulnerabilities on your network? Are you confident that you're finding and remediating critical vulnerabilities in a timely fashion? If your answer is "No," y...

[image

Dawn Jurek ServiceNow Employee

"Enterprises are striving to keep up with the current threat landscape with too many manual processes, while struggling with a lack of resources, skills and budgets. Security and risk management leade...

[image

eileena ServiceNow Employee

Read The Total Economic ImpactTM of ServiceNow Security Operations, a January 2018 commissioned study conducted by Forrester Consulting on behalf of ServiceNow, to see how security teams can be more e...

[image

janenec ServiceNow Employee

Configuration Compliance is a new application in the Kingston release and is part of ServiceNow's Enterprise Security Response suite.Configuration Compliance protects you from security vulnerabilities...

[image

jaimehonaker ServiceNow Employee

While there's no vaccine against malware, taking the right preventative measures can have a similar effect. In healthcare, herd immunity means "when a critical portion of a community is immunized agai...

[image

janenec ServiceNow Employee

I've been spending a lot of time talking to customers over the last few weeks and I've heard a ton of great use cases for our Security Operations product. Let me share a great one right now. If you've...

[image

sean_convery ServiceNow Employee

Don't Panic! The words written on the cover of the Hitchhikers Guide to the Galaxy - It's a good thing, too, because the sheer volume of information required to hitchhike across galaxies would be pret...

[image

seanpmcclean ServiceNow Employee

Piecemeal cybersecurity programs are not only costly to maintain, they can introduce business-disruptive risks to your organization. In my experience, CISOs and CROs who start with the end in mind hav...

[image

Syra Arif ServiceNow Employee

"My friend, my friend (He's got a knife!)"Oh look, another email with an urgent message to change your bank password by clicking an embedded link…from a bank you don't even use. Phishing emails are a ...

[image

myke2 ServiceNow Employee

Everywhere you look these days, security vendors are telling you to "automate or die." In fact, these vendors sometimes make it sound like automation will solve all your problems, calling it "adaptive...

[image

myke2 ServiceNow Employee

Nearly a decade ago, my first ServiceNow project was integrating non-IT processes into onboarding/termination. Ever since, myself and others like me have pushed ServiceNow far beyond the realm of IT S...

[image


Page 5

We care deeply about keeping our data secure. Ensuring that you can only see what you are supposed to see, keeps us and your organization happy. The general perception about security and data is that ...

[image

iris_geist ServiceNow Employee

In the age of automation and productivity, we often overlook the security impact of automation (of everything). Since the release of Aspen, ServiceNow introduced inbound email actions, allowing Servic...

[image

stephen_schoeni ServiceNow Employee

Trying to integrate with a server using SSL, but your software does not have direct access to download the certificates? You may have to download a public certificate manually, first. If you are faced...

[image

jonnyseymour ServiceNow Employee

In this podcast, Lisa Henderson and giora.tamir return to talk about new features for Security Operations in the Helsinki release. ListenSubscribeto iTunesThis episode covers:New featuresThreat intell...

[image

marystromberg ServiceNow Employee

In this episode of ServiceNow Techbytes, l.henderson and giora.tamir provide details about the new Security Incident Response application that can track the progress of security-related incidents from...

[image

marystromberg ServiceNow Employee

View original source

https://www.servicenow.com/community/secops-blog/need-training-on-performance-analytics-jan-is-teaching-next-week/ba-p/2610887