What You Can Automate with SOAR

How the Human Still Plays the Biggest Role in Security Operations

Of all the cybersecurity disciplines, one is uniquely and intrinsically connected to the human being: security operations. The success of... The post How the Human Still Plays the Biggest Role in Security ...

Part 2: Your Security Operations Cheat Sheet for Cloud Logs (And How to Tie Them to the MITRE ATT&CK Framework)

Cloud adoption is growing at astonishing rates, and more than 90 percent of organizations are now operating a multi-cloud strategy.... The post Part 2: Your Security Operations Cheat Sheet for Cloud Logs ...

How to Map SOC Analyst Skills With Experience Level

[Chris Crowley is a cybersecurity instructor and industry analyst. This is Part 3 of his series of easy-to-use “best practice”... The post How to Map SOC Analyst Skills With Experience Level appeared ...
Log4Shell Vulnerability: What Security Operations Teams Need to Know Now and How SOAR Can Help You Detect and Respond

Log4Shell Vulnerability: What Security Operations Teams Need to Know Now and How SOAR Can Help You Detect and Respond

For security professionals, 2021 will conclude with them racing to respond to one of the most grave internet vulnerabilities in... The post Log4Shell Vulnerability: What Security Operations Teams Need to Know Now ...
Incorporating SOAR into Zero Trust and MITRE ATT&CK: A Conversation With Forrester Research

Your Security Operations Cheat Sheet for Windows and Linux Logs (And How to Tie Them to the MITRE ATT&CK Framework)

Within the security operations center, visibility is everything. Being aware of the details of users, assets, known threats, and specific... The post Your Security Operations Cheat Sheet for Windows and Linux Logs ...
Sitdown With a SOC Star: 11 Questions With Sentara Healthcare’s John DePalma

Sitdown With a SOC Star: 11 Questions With Sentara Healthcare’s John DePalma

John DePalma, winner of the 2021 Security Engineer of the Year Award at the inaugural SOCstock Awards, joined the hot... The post Sitdown With a SOC Star: 11 Questions With Sentara Healthcare’s ...

Shifts Happen: How to Rock the SOC Handoff Process With the SEAT-SWAP Method

[Chris Crowley is a cybersecurity instructor and industry analyst. This is Part 2 of his series of easy-to-use “best practice”... The post Shifts Happen: How to Rock the SOC Handoff Process With ...

3 Tips for SecOps Teams Doing Data Backups as Part of Post-Attack Ransomware Recovery

| | Ransomware, SOC Best Practices
Amid all the seemingly unending stories about successful ransomware attacks – even my hometown of Middletown, N.J. is among the... The post 3 Tips for SecOps Teams Doing Data Backups as Part ...
How to Write Crisp and Clear Security Operations Communications Before You Hit Send [Template + Infographic]

How to Write Crisp and Clear Security Operations Communications Before You Hit Send [Template + Infographic]

| | SOC Best Practices
[Chris Crowley is a cybersecurity instructor and industry analyst. This is Part 1 of his series of easy-to-use “best practice”... The post How to Write Crisp and Clear Security Operations Communications Before ...

3 Things Every SOC Team Needs to Know About DevSecOps in a Cloud-Native World

It is one of the hottest buzzwords in the cybersecurity landscape not named zero trust.  DevSecOps has grown in prominence... The post 3 Things Every SOC Team Needs to Know About DevSecOps ...

Secure Guardrails