Canned Playbooks: Are They Realistic?

One of the new ideas we had for a 2019 research paper is something clients often (well, often–ish) ask about: what to do if you encounter a particular threat or a type ...

Adventures of Cyber Security Monitoring During 2018 U.S. Midterm Elections

With all the Russian election hacking scandals in the news during and after the 2016 Presidential election, curiosity consumed me to architect and run an experiment to see if I could monitor ...
3 Pillars of the Modern-Day SOC

The 3 Pillars of the Modern-Day SOC

The world is changing. The way we do business, the way we communicate and the way we secure the enterprise are all vastly different today than they were 20 years ago. The ...
Security Boulevard
How is the Relationship between DevOps and Cybersecurity?

How is the Relationship between DevOps and Cybersecurity?

The relationship between cybersecurity and DevOps is more important than ever, yet just 34% of security professionals indicate the relationship with DevOps is solid ...
What's a Pop-Up SOC

What’s a Pop-Up SOC, and Who Needs One?

High-profile events across the globe are prime targets for hackers, which puts a huge security burden on an event’s host. Even if the host has secured the infrastructure for day-to-day operations, a ...
Security Boulevard
4 Things SOC Managers Should CARE About in 2019

4 Things SOC Managers Should CARE About in 2019

[Originally appeared on Security Boulevard] New Year resolutions in our business lives typically require more careful planning compared to our personal ones. Meny Har, VP of Product at Siemplify, suggests that SOC ...
4 Things SOC Managers Should CARE About in 2019

4 Things SOC Managers Should CARE About in 2019

[Originally appeared on Security Boulevard] New Year resolutions in our business lives typically require more careful planning compared to our personal ones. Meny Har, VP of Product at Siemplify, suggests that SOC ...

Webinar: The Bots Are Coming! A Blue Teamer Survival Guide on Nov 29 2018

| | AI, blue team, Bots, EH-Net Live!, highlight, ML, SIEM, SOAR, SOC
Register Now to See the SOC of Tomorrow and How to Survive It! Peter Schawacker whips SOCs into shape with Security Automation and Orchestration (SOAR), SIEM Analytics, Big Data, Vulnerability Management and ...

Protect Your Network

How do you help your SOC deal with attacks that are well-hidden, already inside the corporate firewall, and have bypassed perimeter-based controls? Leveraging network detection and response, security analyst can reduce mean-time-to-detection ...

Why Your SOC Needs More Than a SIEM Tool

Cybercrime is becoming more sophisticated by the day. Meanwhile, the price for a breach due to damage and disruption, ransom payments and regulatory fines, is increasing. No wonder there’s more of a ...
Loading...