You already have the application in your tool kit. Your organization is paying for it. Here is why you need to use it and how to get started, today, it is easy. Video contents 00:01 Introductions. 00:43 Agenda. 01:21 The Vulnerability Respons...
Hello all, sadly, bad actors are taking advantage of the COVID-19 crisis. There has been a sharp increase of phishing attacks, putting unwelcome pressure on organizations and their people. To protect your organization effectively and efficiently,...
Introduction While MFA is now popular to secure user access, it isn’t for integrations. More than often the only security I see for integrations is a User + Password (or API Key / Client ID + Secret) combination. But we can go further to add safety n...
Luke Kasper is back, this time with key advice on how to the get the best out of VR and SIR Dashboards and Reports. 13 minutes well spent, whether you are just getting started with your applications or have been using them for a while. A call to thin...
Playbook Process Defined Understanding how Playbooks Work, and the Relationship of Runbooks, Knowledge Base Articles and Workflows Runbooks are used to create an association between published Knowledge Base Articles and Security Incident Response T...
The success of your Vulnerability Response implementation relies heavily on your Configuration Management Database (CMDB). Learn why and how to get properly set-up in 10 minutes. In this first episode of the 2020 series on Vulnerability Response (V...
In case you missed the live webinar: https://gateway.on24.com/wcc/eh/1237365/lp/2163283/empower-your-first-responders-with-vulnerability-response Download the slides below:
Hello all, Want to know more about ServiceNow solutions? Demo Center is the place for live technical conversations about our capabilities and functionality. Delivered by ServiceNow Solution Consultants, these sessions go in-depth to show you exactly ...
Hello all, given the success of the video tutorials for new customers of Security Operations apps, we have decided to crank things up a bit in 2020, particularly regarding Vulnerability Response. I am glad to share with you what we have in store for ...
This is a must-see for all ServiceNow customers who are about to get started with Vulnerability Response. Within 15 minutes, Don Harlan, Advisory Solution Consultant at ServiceNow takes us through the fundamental concepts, a product demo and the next...
Learning Paths and Courses The learning paths designed to support success in implementing Security Operations applications includes several types of courses: Prerequisites Product Line Specific Additional Recommended Courses also have more than...
This is a must-see for all ServiceNow customers who are about to get started with Vulnerability Response. Within 15 minutes, Don Harlan, Advisory Solution Consultant at ServiceNow takes us through the fundamental concepts, a product demo and the next...
So you have setup Security Incident Response and Threat Intelligence? Now follow the advice of Syra Arif, Senior Advisory Solution Consultant at ServiceNow to automate, accelerate and lower your risk profile. This 12-minute tutorial will help take yo...
Hello all, A change to the way you access and use your ServiceNow profile is coming. On Sept. 4, 2019, we'll be making it easier for you to navigate through our sites by creating a single ServiceNow ID that you can use to log in to Now Community, Now...
In this new episode of the "Lower your risk profile" series for new and recent users of the Security Incident Response application, Luke Kasper once again shares his expertise to make your life easy and your business successful. Notifications are a c...
The ServiceNow Demo Center hosts several webcast demo events daily. These live sessions are open to anyone and cover topics across the ServiceNow platform. Attendance is anonymous and questions are handled via the chat function in Zoom. Access t...
In this article I will walkthrough and example showing how Flow Designer subflows can be used to create custom REST API Threat Intel enrichments and execute them using a UI Action button. The end goal of this configuration is to have a ThreatGrid Loo...
Edit (5/25/2019): Almost all the installation steps mentioned in this article is no longer applicable as these steps are only applicable to the old version of the integration app developed by Rapid7. This version is discontinued in favour of a newer...
You can collect the RF threat feeds for Domains, IPs, File Hashes and URLs. 1. Define RF Rest Message (Recorded Future Taxii) method with Basic Auth Username = rf and Password = *RF API Key* 2. Create a Post Method(Default Post) , endpoint - https://...
