4 Ways to Maximize Your IR Vendor Relationship
Hiring an incident response (IR) vendor often “checks the box” for companies that need to comply with a regulation or want to improve their security posture. But when minutes count and a cyber incident is in process, that checked box doesn’t automatically translate to an effective response. This blog outlines ... Read More
A Day in the Life of a SOC Analyst
Security Operations Center (SOC) analysts are on the front lines of an organization’s cybersecurity efforts. In a typical SOC, a team of analysts adds diverse specializations and expertise, and works together around-the-clock to monitor and analyze security data and alerts from assets across the environment. If you’ve ever wondered what ... Read More
5 Benefits of Hiring a Virtual Chief Information Security Officer (vCISO)
by Tom Neclerio and Keith Gosselin As digital initiatives and supply chains extend attack surfaces and increase exposure, modern organizations face unprecedented security challenges. Grim statistics illustrate the urgent need for strong and strategic cybersecurity efforts under the guidance of a seasoned leader. But hiring a full-time chief information security ... Read More
Augmenting the Analyst: Using data science, training, tools, and techniques to enhance performance
The increasing demand for cybersecurity analysts is a combination of playing catch-up, keeping up with growing threats/attacker capabilities, and a globally expanding IT footprint. With relief for the growing security skills gap nearly a decade out, we must find ways to support the analysts that are already working to protect ... Read More
7 Questions to Ask When Prioritizing a Vulnerability
Risk exists as vulnerabilities in assets across your distributed environment. But not all vulnerabilities pose risk to your business. How do you determine which ones you should remediate? Use these 7 practical questions to help you prioritize vulnerabilities based on the risk to your business – and focus your mitigation ... Read More
Is Your MDR Actually MDA?
As security talent shortages loom and IT infrastructures – and security technologies – become more complex, many companies are turning to outsourced services as a way to quickly improve their security efforts. Threat detection and response are top priorities for reducing an organization’s critical mean-time-to-detect (MTTD). And what could be ... Read More
4 Ways to Engage Employees in Your Cybersecurity Defense
Humans make mistakes. But when it comes to cybersecurity, their unintentional actions can translate to big costs for your company. In fact, according to the World Economic Forum’s Global Risk Report 2022, 95% of cybersecurity issues are traced to human error. Here are a few ways to strengthen this weak ... Read More
An Essential Synergy: Security Monitoring and Vulnerability Management
When choosing security partners, it is important to find the right technology and service delivery fit for your organization. Not all vendors or technologies are the same, and some will mesh better with your company objectives and operations. But it’s even more difficult to ensure that the different technologies and ... Read More
6 Core Priorities for a Good Cybersecurity Program
As global cyber attacks increase in sophistication and frequency, a strong security position is critical. The effectiveness of an organization’s ability to detect and respond to risks is directly related to its ability to defeat them. In this blog, we outline 6 core priorities that will help you strengthen your ... Read More

Content Is King: Creating and Maintaining SIEM Alert Rule Content
The sheer volume of security alerts generated by a SIEM can be overwhelming, and it is critical that security teams are able to prioritize the alerts that could stop a potential attack in its tracks. This blog post reviews how SIEM alerts are generated and the basic steps a security ... Read More