Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Why People Still Dominate Modern Security Operations (And How Detection and Response Technology Can Help)

Of all the cybersecurity disciplines, one is uniquely and intrinsically connected to the human being: security operations. The success of the modern security operations center, despite the infusion of automation, machine learning, and artificial intelligence, remains heavily dependent on people. This is largely due to the vast amounts of data a SOC must ingest – a product of an attack surface ceaselessly expanding in the age of professionalized cybercrime and the borderless enterprise.

Part 2: Your Security Operations Cheat Sheet for Cloud Logs (And How to Tie Them to the MITRE ATT&CK Framework)

Cloud adoption is growing at astonishing rates, and more than 90 percent of organizations are now operating a multi-cloud strategy. While data protection concerns are obviously not restraining cloud adoption, seven out of ten businesses remain concerned about covering all of their security blind spots.

Google Cloud Security Talks Set to Tackle Improving Your Threat Detection and Response

As if your detection and response efforts needed any more reminding, the tenuous state of geopolitics has left many security operations teams anxiously anticipating an uptick in attacks targeting Western interests. And, by the way, that everyday stuff, including vulnerabilities, banking Trojans (hello, Emotet!) and phishing attacks, are still running rampant.

How to Map SOC Analyst Skills With Experience Level

Security operations centers (SOCs) exist to deliver sustained monitoring and response capabilities. Staff members are a core pillar of this mission. Each SOC should have clearly articulated roles and levels for its personnel. This helps to establish fair practices for hiring, training, promotion, compensation and performance expectations.

Siemplify is Joining Forces with Google Cloud

Today, I am excited and proud to announce that Siemplify has been acquired by Google. This marks an important milestone in the Siemplify journey. When co-founders Alon Cohen and Garry Fatakhov and I started Siemplify in 2015, we all knew, from our experience building and training security operations centers from around the world, that security operations was a function in dire need of innovation.

Sitdown With a SOC Star: 11 Questions With MRK's Managed Security Services Director Todd Pigram

Our “holiday” edition of Sitdown gives you the gift of Todd Pigram, who began his IT career in the late 1990s as a laptop repairman. His lengthy tenure in the IT space has truly come full circle, as his role now involves helping to protect those popular endpoints, especially vulnerable in the era of heavy remote work.

Log4Shell Vulnerability: What Security Operations Teams Need to Know Now and How SOAR Can Help You Detect and Respond

For security professionals, 2021 will conclude with them racing to respond to one of the most grave internet vulnerabilities in recent memory. The Log4Shell vulnerability, an input-validation flaw in the omnipresent Apache logging library Log4j and disclosed by the open-source company on Thursday, exposes “the world’s most popular applications and services” to remote code execution.

Your Security Operations Cheat Sheet for Windows and Linux Logs (And How to Tie Them to the MITRE ATT&CK Framework)

Within the security operations center, visibility is everything. Being aware of the details of users, assets, known threats, and specific vulnerabilities present across security, network, server, application and database sources allows security operations teams to act quickly and decisively to address possible risks.

Sitdown With a SOC Star: 11 Questions With Sentara Healthcare's John DePalma

John DePalma, winner of the 2021 Security Engineer of the Year Award at the inaugural SOCstock Awards, joined the hot seat for another edition of “Sitdown With a SOC Star.” DePalma, a security engineer at Sentara Healthcare, describes himself as an “IT security enthusias,t” and after reading this interview, you’ll realize his fondness for protecting things transcends his professional career.

How SOAR Helps to Hold Up Your Part of the Cloud Security Shared Responsibility Model

The allure of the cloud is indisputable. Flexibility, reliability, efficiency, scalability and cost savings are tantalizing traits for a business at any time, never mind when most have been catapulted into a colossal work-from-home experiment. According to O’Reilly’s annual cloud adoption survey, nine out of 10 businesses now use cloud computing, with nearly half planning to migrate more than 50 percent of their applications into the cloud in the upcoming year.