New York City, NY, USA
Nov 13, 2019   |  By Steve Salinas
It’s hard to believe that cars were once put together by hand, but it’s true. The early auto workers toiled with rudimentary equipment to build the first personnel vehicle to drive on four wheels. Due to the inordinate effort required to put together these lumbering beasts, only the very wealthy could afford such a luxury. That all changed with the introduction of the assembly line.
Nov 7, 2019   |  By Steve Salinas
Everyone involved in the triage, investigation and response to security incidents battles the same adversary: Time. Whether you are a Tier 1 analyst weeding out false positives or a senior analyst dissecting a sophisticated attack, the clock is always against you.
Nov 6, 2019   |  By Dan Kaplan
There are many gifted security operations professionals in the world, grinding day after day, without much fanfare. Most, of course, are not attention-seekers by nature – if they were, they likely wouldn’t have chosen the cybersecurity career path – but far too many remain in the shadows, despite having so many valuable insights and anecdotes to share about their experiences and craft. We want to change that.
Oct 31, 2019   |  By Dan Kaplan
Halloween is Thursday, but if you work in a security operations center, you might feel like every day is All Hallows’ Eve considering the level of dread that can greet you at any moment. The truth is that you’re probably not seeing the real scary stuff that your adversaries have to offer – why use a flashy zero-day exploit when something far more rudimentary works just as well – but that doesn’t mean hacks, breaches and other incidents have slowed in 2019.
Oct 29, 2019   |  By Tim Condello
Imagine being a patient in a hospital, and when your knowledgeable caretaker leaves for the day, the incoming attendant is unfamiliar with your condition, medication needs and other specifics about your case. Aside from the obvious anxiety and feelings of abandonment you would feel, you also would run the risk of receiving error-prone or incorrect treatment. Now think about cyber threats. They can happen at any time, and once they arrive, they aren’t always easily extinguishable.
Jun 26, 2019   |  By Siemplify
No business is immune from digital attacks, making the ability to detect and respond to cyber incidents more important than ever. And that’s where security operations come in to play. Because they are built around monitoring, analysis and triage, SecOps have become the centerpiece of an organization’s security program.
Feb 24, 2019   |  By Siemplify
MSSP security operations teams face unique challenges in addition to those that plague the average SOC. Siemplify's security orchestration and automation buyer's guide outlines the features and outcomes MSSPs should prioritize when considering a security orchestration solution.
Feb 24, 2019   |  By Siemplify
Acquire security orchestration and automation best practices, tried and tested by our global customer base. Developed by our in-house experts who provide guidance to security teams worldwide, these playbooks facilitate and integrate alerts handling and incident response plans. These are the earliest in a series that continues to grow over time.
Feb 1, 2019   |  By Siemplify
Security Orchestration, Automation and Response platforms are rapidly becoming a must-have solution for SOC teams. Understanding the business case is a key step to implementing SOAR in your organization.
Oct 16, 2019   |  By Siemplify
ServiceNow is used by organizations of all sizes to track, manage and monitor IT-related workflows and actions. Through the Siemplify integration all security investigation, response and recovery workflows can flow effortlessly into ServiceNow.
Oct 16, 2019   |  By Siemplify
In this updated demo video, see just how easy it is to integrate your Carbon Black solutions with the Siemplify Security Operations Platform to drive significant efficiency gains across the entire SOC.
Sep 25, 2019   |  By Siemplify
Effective case management can be a real game-changer for your security operations center (SOC). There are four key unique capabilities in Siemplify that deliver unmatched case management.
Sep 25, 2019   |  By Siemplify
Where SOAR vendors differ is how they deliver, or attempt to deliver, their value. While user interfaces differ, and investigation capabilities may vary, at the core a SOAR solution is either alert-centric or threat-centric.
Sep 19, 2019   |  By Siemplify
Security incidents touch all parts of the business. Siemplify's interactive "war room" provides instant visibility and collaboration among security operations teams and executive, legal, HR and other stakeholders to quickly address and effectively handle breaches and other events.