There is nothing better than an instructor-led ServiceNow course. We
cover the material in the on-demand course and then usually go a little
further. We explore questions presented by students. We tal...
Shift handover feature: The purpose of a shift handover feature in a SOC
is to ensure seamless transition of responsibilities, information, and
ongoing tasks between different shifts or security analy...
TISC is GA now!! We are excited to announce that Threat Intelligence
Security Center (TISC), ServiceNow's Threat Intelligence Platform, was
released as GA on 9th May, 2024!!. Here's more about the pro...
With the 2024 Washington D.C. release come various exciting updates to
our Security Operations offering. Notably, the introduction of Security
Posture Control to our suite of applications. Security Po...
We bring you exciting news!! Threat Intelligence Security Center (TISC),
the new Threat Intelligence Platform from ServiceNow, was successfully
released in cGTM (Controlled Go-To-Market) mode on Febru...
Dear SecOps Community Members, On December 7th, 2023 we presented a
webinar on Major Security Incident Management (MSIM) - Tips for
Successful Deployment. For those of you who could not make it, we
co...
What's New in Vancouver for ServiceNow Security Operations Products
ServiceNow's Security Operations suite is expanding with new innovations
in the Vancouver release. There are a few notable upgrades ...
We have released the first beta of Threat Intelligence Security Centre,
our new Threat Intelligence Platform product. If you are interested to
enrol in our DPP (Design Partnership Program) and validat...
In today's digital landscape, vulnerabilities have become a serious and
long-standing concern. However, log4j has elevated this risk to another
level, posing a significant threat to business reputatio...
Introduction Security Posture Control is a new product that was launched
on ServiceNow store on August 3rd, 2023. We are looking for early
adopter customers who can test this product in their sub-prod...
Security is more important than ever. But implementing top security
measures across a large, complex company is not easy. At ServiceNow, we
use our own security products to protect our customers and o...
What is a Zero-Day Vulnerability? The term "zero-day" refers to the fact
that the vendor or developer has only just learned of the flaw which
means they have “zero days” to fix it. A zero-day attack t...
A zero trust security policy presumes that any connection to a corporate
network or system cannot be trusted. How do you set one a zero trust
network on the platform that ensures data access is secure...
Security Incident Response Workspace With Utah, the SIR Workspace has a
flexible and reimagined user experience. Designed with Tier 1 and 2
security analysts in mind, it includes all new analyst dashb...