Security operations center, Part 2: Life of a SOC analyst 

In the first part of this blog series, we saw a brief overview of what a security operations center (SOC) is and how it operates. In this part, we’ll take a look ...
SOC Threat Coverage Analysis — Why/How?

SOC Threat Coverage Analysis — Why/How?

| | SOC, threat detection
SOC Threat Coverage Analysis — Why/How?As I mentioned in Detection Coverage and Detection-in-Depth, the topic of threat detection coverage has long fascinated me. Back in my analyst days, we looked at it as a ...
The SOC Reckoning

The SOC Reckoning

| | Blog, SIEM, SOAR, SOC
What are companies really gaining when they take on SOAR? At a high level, SOAR and legacy platforms are falling far short of their promises. SOCs are left with several pivotal questions ...

2021: The Year SOCs Embrace Cybersecurity Convergence

Staying on top of cybersecurity risk can feel like a losing battle in today’s modern, hyperconnected reality. The influx of IoT devices and increased reliance of BYOD devices has created a diverse, ...
Misconceptions of the SOAR “Playbook”

Misconceptions of the SOAR “Playbook”

| | Blog, SIEM, SOAR, SOC, whitepaper
Most customers are surprised to learn that SOAR platforms rely on invoking 3rd party technologies, including next-generation firewalls and endpoint protection platforms via traditional API calls to isolate and quarantine malicious threats ...

Building a Better SOC Based on What We Learned in 2020

Every network vulnerability opened new opportunities for hackers to infiltrate systems, steal data and wreak havoc. Several notable security incidents have left governments, private organizations, medical systems and large enterprise networks reeling ...

A Utility Company’s Barriers to Successful Network Oversight

The only truly workable network solution must bridge the inherent gaps that exist throughout [infrastructure] systems. It must also be capable enough to root out hidden vulnerabilities ripe for hacking ...
logging

How Logging Eliminates Security Blindspots to Better Identify Threats

The digital landscape continues to grow increasingly complex, and security risk and operational costs rise as digital transformation accelerates. According to research by McKinsey and Company, more than 70 percent of security ...
Security Boulevard
New Paper: “Future of the SOC: SOC People — Skills, Not Tiers”

New Paper: “Future of the SOC: SOC People — Skills, Not Tiers”

| | security operations, SOC
New Paper: “Future of the SOC: SOC People — Skills, Not Tiers”Back in August, we released our first Google/Chronicle — Deloitte Security Operations Center (SOC) paper titled “Future of the SOC: Forces shaping modern security operations” (launch ...