How to Automate a Ransomware Response in 5 Steps

How to Automate a Ransomware Response in 5 Steps

As if organizations are not under enough pressure from ransomware purveyors, Check Point estimates that ransomware attacks have roughly doubled... The post How to Automate a Ransomware Response in 5 Steps appeared ...
Introducing the 5 Biggest Security Operations Trends Shaping Today’s MSSP [Free Guide]

Introducing the 5 Biggest Security Operations Trends Shaping Today’s MSSP [Free Guide]

Across the world, organizations are turning to MSSPs in surging numbers to help them own or extend cybersecurity coverage and... The post Introducing the 5 Biggest Security Operations Trends Shaping Today’s MSSP ...
How to Measure Effectiveness of Your Security Operations with SOAR and Business Intelligence (+Video)

How to Measure Effectiveness of Your Security Operations with SOAR and Business Intelligence (+Video)

Rising above the daily firefighting to actually measure the effectiveness of your security operations is easier said than done. This,... The post How to Measure Effectiveness of Your Security Operations with SOAR ...

SOC Quarantine Diaries Ep. 6: Block.One’s Eddie Schwartz

Audio Version Episode 6 of SOC Quarantine Diaries catches up with security industry luminary Eddie Schwartz, who is CSO of... The post SOC Quarantine Diaries Ep. 6: Block.One’s Eddie Schwartz appeared first ...
Responding to Cloud Misconfigurations with Security Automation and Common-Sense Tips

Responding to Cloud Misconfigurations with Security Automation and Common-Sense Tips

Few things can boil the blood of a security professional quite like the unforced error. It is a common term... The post Responding to Cloud Misconfigurations with Security Automation and Common-Sense Tips ...
Selecting the Best SOAR Solution Series: Case (Management) in Point (Part 3)

Selecting the Best SOAR Solution Series: Case (Management) in Point (Part 3)

Welcome to part 3 of our series examining how to select the best security, orchestration, automation and response (SOAR) solution... The post Selecting the Best SOAR Solution Series: Case (Management) in Point ...
How Your SOC Team Can Triumph With Tabletop Exercises [Free Guide]

How Your SOC Team Can Triumph With Tabletop Exercises [Free Guide]

Among emergency responders, including in the realm of cyber, tabletop exercises are widely accepted as a reliable training activity for... The post How Your SOC Team Can Triumph With Tabletop Exercises [Free ...
Logix CISO on remote workforce security strategies

How Remote Work is Reshuffling Your Security Priorities and Investments

Roughly five months into the pandemic, stark stories of unsustainability have emerged, from personal debt caused by months-long unemployment to... The post How Remote Work is Reshuffling Your Security Priorities and Investments ...
Introducing Gartner’s Tips for Selecting the Right Tools for Your Security Operations Center

Introducing Gartner’s Tips for Selecting the Right Tools for Your Security Operations Center

The security operations center (SOC) is a complex place. For one, attaining efficiency is critical, considering time and effort are... The post Introducing Gartner’s Tips for Selecting the Right Tools for Your ...
How Automation Can Help You Respond to Hacked Credentials Circulating the Dark Web

How Automation Can Help You Respond to Hacked Credentials Circulating the Dark Web

Much like the legitimate economy, the cybercriminal marketplace experiences ebbs and flows. Current factors working against it include the ripple... The post How Automation Can Help You Respond to Hacked Credentials Circulating ...