Responding to Cloud Misconfigurations with Security Automation and Common-Sense Tips

Responding to Cloud Misconfigurations with Security Automation and Common-Sense Tips

Few things can boil the blood of a security professional quite like the unforced error. It is a common term... The post Responding to Cloud Misconfigurations with Security Automation and Common-Sense Tips ...
Selecting the Best SOAR Solution Series: Case (Management) in Point (Part 3)

Selecting the Best SOAR Solution Series: Case (Management) in Point (Part 3)

Welcome to part 3 of our series examining how to select the best security, orchestration, automation and response (SOAR) solution... The post Selecting the Best SOAR Solution Series: Case (Management) in Point ...
How Your SOC Team Can Triumph With Tabletop Exercises [Free Guide]

How Your SOC Team Can Triumph With Tabletop Exercises [Free Guide]

Among emergency responders, including in the realm of cyber, tabletop exercises are widely accepted as a reliable training activity for... The post How Your SOC Team Can Triumph With Tabletop Exercises [Free ...
Logix CISO on Remote Workforce Security Strategies

How Remote Work is Reshuffling Your Security Priorities and Investments

Roughly five months into the pandemic, stark stories of unsustainability have emerged, from personal debt caused by months-long unemployment to... The post How Remote Work is Reshuffling Your Security Priorities and Investments ...
Selecting the Best SOAR Solution Series: What’s in a Name? (Part 1)

Selecting the Best SOAR Solution Series: What’s in a Name? (Part 1)

Security orchestration, automation and response, commonly known as SOAR, is one of the most talked about technologies in cybersecurity these... The post Selecting the Best SOAR Solution Series: What’s in a Name? ...
How Automation Can Help You Respond to Hacked Credentials Circulating the Dark Web

How Automation Can Help You Respond to Hacked Credentials Circulating the Dark Web

Much like the legitimate economy, the cybercriminal marketplace experiences ebbs and flows. Current factors working against it include the ripple... The post How Automation Can Help You Respond to Hacked Credentials Circulating ...
What Is SIEM? What Is SOAR? How Do They Compare? Do You Need Both?

What Is SIEM? What Is SOAR? How Do They Compare? Do You Need Both?

With all the acronyms floating around in cybersecurity, it is easy to get confused by what means what. Security information... The post What Is SIEM? What Is SOAR? How Do They Compare? ...
How to Take Command During a Security Crisis (+Video)

How to Take Command During a Security Crisis (+Video)

A successful response to a cybersecurity crisis scenario requires having a central integration hub where incidents are managed by security... The post How to Take Command During a Security Crisis (+Video) appeared ...
8 Best Practices for Secure Remote Work Access

8 Best Practices for Secure Remote Work Access

As more and more employees have transitioned to working remotely, the cybersecurity threats that their organizations face have changed. While... The post 8 Best Practices for Secure Remote Work Access appeared first ...
What You Can Automate with SOAR

How SOAR Can Take Your Security Budget Further in Turbulent Times

When stay-at-home orders came down for much of the world in March, few businesses were spared the consequences of trying... The post How SOAR Can Take Your Security Budget Further in Turbulent ...