How Your SOC Team Can Triumph With Tabletop Exercises [Free Guide]

How Your SOC Team Can Triumph With Tabletop Exercises [Free Guide]

Among emergency responders, including in the realm of cyber, tabletop exercises are widely accepted as a reliable training activity for... The post How Your SOC Team Can Triumph With Tabletop Exercises [Free ...
Logix CISO on Remote Workforce Security Strategies

How Remote Work is Reshuffling Your Security Priorities and Investments

Roughly five months into the pandemic, stark stories of unsustainability have emerged, from personal debt caused by months-long unemployment to... The post How Remote Work is Reshuffling Your Security Priorities and Investments ...
Introducing Gartner’s Tips for Selecting the Right Tools for Your Security Operations Center

Introducing Gartner’s Tips for Selecting the Right Tools for Your Security Operations Center

The security operations center (SOC) is a complex place. For one, attaining efficiency is critical, considering time and effort are... The post Introducing Gartner’s Tips for Selecting the Right Tools for Your ...
How Automation Can Help You Respond to Hacked Credentials Circulating the Dark Web

How Automation Can Help You Respond to Hacked Credentials Circulating the Dark Web

Much like the legitimate economy, the cybercriminal marketplace experiences ebbs and flows. Current factors working against it include the ripple... The post How Automation Can Help You Respond to Hacked Credentials Circulating ...
What Is SIEM? What Is SOAR? How Do They Compare? Do You Need Both?

What Is SIEM? What Is SOAR? How Do They Compare? Do You Need Both?

With all the acronyms floating around in cybersecurity, it is easy to get confused by what means what. Security information... The post What Is SIEM? What Is SOAR? How Do They Compare? ...
8 Best Practices for Secure Remote Work Access

8 Best Practices for Secure Remote Work Access

As more and more employees have transitioned to working remotely, the cybersecurity threats that their organizations face have changed. While... The post 8 Best Practices for Secure Remote Work Access appeared first ...
What You Can Automate with SOAR

How SOAR Can Take Your Security Budget Further in Turbulent Times

When stay-at-home orders came down for much of the world in March, few businesses were spared the consequences of trying... The post How SOAR Can Take Your Security Budget Further in Turbulent ...
Preventing Data Exfiltration: Definition, Examples and Best Practices

Preventing Data Exfiltration: Definition, Examples and Best Practices

As one of the biggest threats to data security, data exfiltration has the potential to result in devastating outcomes for... The post Preventing Data Exfiltration: Definition, Examples and Best Practices appeared first ...
Kraken CISO Nick Percoco on the crypto exchange’s “productive paranoia” and the future of protecting home networks (Video)

Kraken CISO Nick Percoco on the crypto exchange’s “productive paranoia” and the future of protecting home networks (Video)

Audio Version Episode 3 of SOC Quarantine Diaries catches up with veteran security mind Nick Percoco, whose renowned career... The post Kraken CISO Nick Percoco on the crypto exchange’s “productive paranoia” and ...
Looks Can Be Deceiving: Context and the New Normative in Log and Event Analysis

Looks Can Be Deceiving: Context and the New Normative in Log and Event Analysis

(The following is a guest post written by Alissa Knight, an ethical hacker, entrepreneur and author.) Is your SIEM or... The post Looks Can Be Deceiving: Context and the New Normative in ...