<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>TechTonic Times</provider_name><provider_url>https://www.abrahamsconsulting.com/blog</provider_url><title>SOC Workbench - Threat Investigation - TechTonic Times</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="QKSM6U92Ry"&gt;&lt;a href="https://www.abrahamsconsulting.com/blog/soc-workbench-threat-investigation/"&gt;SOC Workbench &#x2013; Threat Investigation&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.abrahamsconsulting.com/blog/soc-workbench-threat-investigation/embed/#?secret=QKSM6U92Ry" width="600" height="338" title="&#x201C;SOC Workbench &#x2013; Threat Investigation&#x201D; &#x2014; TechTonic Times" data-secret="QKSM6U92Ry" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.abrahamsconsulting.com/blog/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><description>Threats move fast &#x2014; your SOC needs to move faster.  In this demo video, see how @eSentire SOC Workbench combines GenAI-driven analysis with expert human insight to detect, investigate, and respond to threats in real time. Watch it to see how the right tools and expertise can transform your security operations.</description></oembed>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/


Served from: www.abrahamsconsulting.com @ 2026-04-24 23:06:33 by W3 Total Cache
-->