Security Orchestration and Automation

We’ve SOARed and SOARed, and Now We’ve Reached the Cloud

  Today marks a big day for Siemplify with the official launch of Siemplify Cloud – the cloud-native security operations...…

6 months ago

Looks Can Be Deceiving: Context and the New Normative in Log and Event Analysis

(The following is a guest post written by Alissa Knight, an ethical hacker, entrepreneur and author.) Is your SIEM or...…

7 months ago

What is Vulnerability Management?

IT infrastructure is more complex and interconnected than ever. For attackers, this provides a gold mine for easy attack vectors....…

7 months ago

How Security Teams Are Automating, According to a New SANS Survey

Automation did not enter popular lexicon until the 1940s, when Henry Ford introduced an official “automation department” at his Michigan...…

7 months ago

What is Incident Response? A 5-Step Plan to Resolve Security Events

In the context of cybersecurity, incident response refers to the tools, processes and methodologies that businesses use to respond to...…

7 months ago

What is SIEM? The Roadmap to a Better SOC

As the frequency and severity of data breaches continues to increase, and users become more concerned about privacy and the...…

7 months ago

3 Emerging Remote Security Use Cases Addressable with SOAR Playbooks

Even as many SOC teams have shifted to remote operations in recent weeks, the basics of their mission are unwavering:...…

8 months ago

A Compare-and-Contrast Between Next-Gen SIEM and SOAR

(The following is a guest post written by Alissa Knight, an ethical hacker, entrepreneur and author.) The average lifespan of...…

8 months ago

Introducing a Technical Guide to Remote Security Operations

The widespread coronavirus-forced lockdown is unlikely the first time security operations teams have had to temporarily migrate away from physically...…

8 months ago

Security Orchestration, Automation and Response: Everything You Need to Know to Get Started

Security operations is a well-established discipline — many businesses have even had SecOps strategies in place for decades. Yet the...…

8 months ago