What is a Security Operations Center (SOC) and Why Do You Need It?

What is a Security Operations Center (SOC) and Why Do You Need It?

The global average total cost of a data breach in 2021 was a whopping $4.24 million. According to the trendsRead More The post What is a Security Operations Center (SOC) and Why ...
cybersecurity MSPs

3 Pillars of a Successful Managed Security Services Deployment

As much as they’d like to be able to, not many enterprises can afford a dedicated, in-house SWAT team of security experts, ready to pounce on and deflect the latest threats to ...
Security Boulevard
policy-as-code SecOps GitLab security policy operational resilience SOC certificate DevSecOps: Beyond Manual Policy Implementation

Security Operations Center (SOC) Performance Falling Short 

Disconnects in perception between security operations center (SOC) leadership and staff in terms of organizational effectiveness and capability are hampering organizational efforts to combat cybercrime and other issues, according to a report.  ...
Security Boulevard
CISO Stories Podcast: Which Approach Wins - Compliance or Risk?

CISO Stories Podcast: Which Approach Wins – Compliance or Risk?

Cybersecurity programs have evolved from the early days of compliance with regulations. Regulations are important and provide the necessary motivation for many organizations to implement security controls that may not otherwise be ...
CISO Stories Podcast: Who is Your SOC Really For?

CISO Stories Podcast: Who is Your SOC Really For?

Managing the volume of security events and continuous threat intelligence can be daunting for the largest of organizations. How do you increase the effectiveness of a Security Operations Center (SOC) and share ...
CISO Stories Podcast: Five Mistakes Impacting Security and Privacy Policy Creation

CISO Stories Podcast: Five Mistakes Impacting Security and Privacy Policy Creation

Charles Cresson Wood set the ‘gold standard’ for policy guidance with the book Information Security Policies Made Easy, now in its 14th version. Wood has extensively researched what separates good processes from ...
THREAT ALERT: Malicious Code Implant in the UAParser.js Library

THREAT ALERT: Malicious Code Implant in the UAParser.js Library

The Cybereason Global Security Operations Center (SOC) issues Cybereason Threat Alerts to inform customers of emerging impacting threats. The Alerts summarize these threats and provide practical recommendations for protecting against them ...
What is XDR? Understanding Extended Detection and Response

What is XDR? Understanding Extended Detection and Response

XDR, shorthand for the product category of Extended Detection and Response, is a security approach that extends the power of EDR (Endpoint Detection and Response) capabilities to create integrated detection and response ...
CISO Stories Podcast: NotPetya - 45 Minutes and 10,000 Servers Encrypted

CISO Stories Podcast: NotPetya – 45 Minutes and 10,000 Servers Encrypted

Learn how to prepare and reduce the risk of the next ransomware event as Todd Inskeep, Founder at Incovate Solutions, walks us through the lessons learned after managing out of a NotPetya ...