SecOps

SOC Quarantine Diaries: Keven Knight of Sy4 on Opening a SOC in 2020

In Ep. 5 of SOC Quarantine Diaries, Knight joins us to discuss the benefit for an MSSP to retain a physical SOC presence (7:10), the nefarious opportunities that the rise in remote workers and devices on the network have given cybercriminals (10:05), and how collaboration among personnel of varying security operations disciplines can continue effectively in the era of coronavirus (22:30), plus much more.
logsign

Find the Correct MSSP or Build an Efficient SOC? (Part 1)

Whether you are a CIO or chief executive of your company, the headlines of cybersecurity threats and attacks might be worrisome for you. There is always a question about how to ensure the cybersecurity of the organization to avoid financial, compliance and reputational risks. Today, to deal with ever-growing, fast, and sophisticated cybersecurity threats and attacks, enterprises either find the correct MSSP (Managed Security Service Provider) or build an efficient SOC (Security Operation Center).

devo

Why Threat Intelligence Sharing is the Future of SOC Analyst Productivity

With all the cyberthreats around today, security operations center (SOC) analysts need the right tools to identify, respond to, and stop those threats. Increasingly, threat intelligence sharing is one of the key tools for preventing threat actors from breaching organizations’ network, infrastructure, and operational environments, including the cloud.

siemplify

How SOAR Can Treat the Cybersecurity Skills Shortage

Raise your hand if you are aware that a (worsening) massive global skills shortage is afflicting the cybersecurity industry, leaving many organizations open to greater attack and breach risk because they lack the appropriate talent and skills to defend against their adversaries. Now that everyone’s hand is raised, we can move on to thinking about solutions.

logsign

How Cyber Kill Chain Can Be Useful for a SOC Team? (Part 2)

Installation: At this stage, SOC analysts are advised to deploy a Security Information and Event Management (SIEM) and Host-Based Intrusion Detection System (HIDS) to detect attacks. To deny an attack, Cyber Kill Chain recommends using Two-Factor authentication, strong password, and privilege separation as well as disrupting attack using data execution prevention.

nnt

Understanding the Essential Elements of a SecureOps Strategy

The traditional approach to security is desperately flawed. NNT’s SecureOps strategy is a progressive way to deal with solving the problem of cybersecurity by combining the essential prescribed security controls recommended by frameworks such as NIST and the Center for Internet Security (CIS) with advanced threat prevention and detection, closed-loop intelligent change control and continuous compliance monitoring technology.

siemplify

Powerfully Simple SOAR for Service Providers [Video]

Security service providers require a software-driven foundation to deliver high-quality services that impress customers. But building this foundation for your business shouldn’t take you years of effort and massive investments in software development. Siemplify has already spent over five years building an industry-leading platform for service providers like you to manage your security operations.

cygilant

Affordable SOC-as-a-Service for SMEs

You may think that a Security Operations Center (SOC) is only for very large companies, but the reality is that malicious actors target any size company. A SOC is simply the epicenter of security, responsible for every aspect of protecting the organization. You have the choice of doing it yourself on-premises or outsourcing this to an experienced cybersecurity-as-a-service. A SOC combines people, process and technology to monitor and remediate IT security and compliance throughout your organization.