3 Key Benefits of Automating the Grunt Work of Your Security Operations

It’s hard to believe that cars were once put together by hand, but it’s true. The early auto workers toiled... The post 3 Key Benefits of Automating the Grunt Work of Your ...

Operationalizing Incident Response

Risk management, threat intelligence, and incident response come together in a sensible, practical, and operational detect and respond model to positively impact your cyber risk strategy. Staffing models (small and large), tools, ...
Survey Finds Many SOCs are Set Up to Fail

Survey Finds Many SOCs are Set Up to Fail

Devo is a sponsor of TechSpective At face value, the idea of a security operations center (SOC) makes tremendous sense. What organization wouldn’t want a team of dedicated cybersecurity professionals monitoring the ...

How Security Operations Teams Are Winning Amid SOC Challenges (Video)

Alert fatigue, skills shortages, process shortfalls and budget restrictions are all working against the security operations center (SOC), which... The post How Security Operations Teams Are Winning Amid SOC Challenges (Video) appeared ...
Detection & Response: Building Effective SOC Operations

6 Tips for Building an Effective SOC

| | Blog, ids, Incident Response, IPS, SOC
A presentation from RSA Unplugged 2019 offers several tips to security leaders seeking to build or improve their security operations center (SOC) ...

7 Threat Hunting Benchmarks from a Survey of Security Pros

| | Blog, ids, IPS, SOC, threat detection, Threat Hunting
Threat hunting aims to find threats that didn’t trigger an alert, yet it’s still a new concept for many, so these threat hunting benchmarks are useful waypoints ...
How to Manage a Companywide Security Crisis from the SOC (Video)

How to Manage a Companywide Security Crisis from the SOC (Video)

So you’ve been breached. Putting aside the fact that your security infrastructure failed to prevent it from happening, you... The post How to Manage a Companywide Security Crisis from the SOC (Video) ...
Security at Scale Grow Your Security

Security at Scale: Grow Your Security, Not Your Risk

As a company grows, its security must grow with it. Here’s how companies can scale their security to match their growth All businesses want to become the next big thing, but with ...
Security Boulevard
How to Break Broken SOC Cycles

How to Break Broken SOC Cycles

We’ve all heard the same buzzwords used to describe the current situation in security operation centers (SOCs). Among them are “alert fatigue,” “labor crunch,” the “skills gap,” “high turnover” and “missing advanced ...
Security Boulevard
How Siemplify Uses Machine Learning to Drive SOC Efficiency

How Siemplify Uses Machine Learning to Drive SOC Efficiency

The promise of machine learning in cybersecurity, specifically inside the security operations center, is vast, but let’s not get ahead... The post How Siemplify Uses Machine Learning to Drive SOC Efficiency appeared ...
Loading...