4 Ways to Maximize Your IR Vendor Relationship

| | SBN News
Hiring an incident response (IR) vendor often “checks the box” for companies that need to comply with a regulation or want to improve their security posture. But when minutes count and a cyber incident is in process, that checked box doesn’t automatically translate to an effective response. This blog outlines ... Read More

A Day in the Life of a SOC Analyst

| | SBN News
Security Operations Center (SOC) analysts are on the front lines of an organization’s cybersecurity efforts. In a typical SOC, a team of analysts adds diverse specializations and expertise, and works together around-the-clock to monitor and analyze security data and alerts from assets across the environment. If you’ve ever wondered what ... Read More

5 Benefits of Hiring a Virtual Chief Information Security Officer (vCISO)

| | SBN News
by Tom Neclerio and Keith Gosselin As digital initiatives and supply chains extend attack surfaces and increase exposure, modern organizations face unprecedented security challenges. Grim statistics illustrate the urgent need for strong and strategic cybersecurity efforts under the guidance of a seasoned leader. But hiring a full-time chief information security ... Read More

Augmenting the Analyst: Using data science, training, tools, and techniques to enhance performance

| | SBN News
The increasing demand for cybersecurity analysts is a combination of playing catch-up, keeping up with growing threats/attacker capabilities, and a globally expanding IT footprint. With relief for the growing security skills gap nearly a decade out, we must find ways to support the analysts that are already working to protect ... Read More

7 Questions to Ask When Prioritizing a Vulnerability

| | SBN News
Risk exists as vulnerabilities in assets across your distributed environment. But not all vulnerabilities pose risk to your business. How do you determine which ones you should remediate? Use these 7 practical questions to help you prioritize vulnerabilities based on the risk to your business – and focus your mitigation ... Read More

Is Your MDR Actually MDA?

| | SBN News
As security talent shortages loom and IT infrastructures – and security technologies – become more complex, many companies are turning to outsourced services as a way to quickly improve their security efforts. Threat detection and response are top priorities for reducing an organization’s critical mean-time-to-detect (MTTD). And what could be ... Read More

4 Ways to Engage Employees in Your Cybersecurity Defense

| | SBN News
Humans make mistakes. But when it comes to cybersecurity, their unintentional actions can translate to big costs for your company. In fact, according to the World Economic Forum’s Global Risk Report 2022, 95% of cybersecurity issues are traced to human error. Here are a few ways to strengthen this weak ... Read More

An Essential Synergy: Security Monitoring and Vulnerability Management

| | SBN News
When choosing security partners, it is important to find the right technology and service delivery fit for your organization. Not all vendors or technologies are the same, and some will mesh better with your company objectives and operations. But it’s even more difficult to ensure that the different technologies and ... Read More

6 Core Priorities for a Good Cybersecurity Program

| | SBN News
As global cyber attacks increase in sophistication and frequency, a strong security position is critical. The effectiveness of an organization’s ability to detect and respond to risks is directly related to its ability to defeat them. In this blog, we outline 6 core priorities that will help you strengthen your ... Read More
Content Is King: Creating and Maintaining SIEM Alert Rule Content

Content Is King: Creating and Maintaining SIEM Alert Rule Content

| | SBN News
The sheer volume of security alerts generated by a SIEM can be overwhelming, and it is critical that security teams are able to prioritize the alerts that could stop a potential attack in its tracks. This blog post reviews how SIEM alerts are generated and the basic steps a security ... Read More

Secure Guardrails