What is Vulnerability Management?

IT infrastructure is more complex and interconnected than ever. For attackers, this provides a gold mine for easy attack vectors. In fact, approximately 60% of breaches involve unpatched software. This means that a majority of attacks were actually avoidable had the proper oversight and maintenance been in place. With an established vulnerability management process, IT organizations can greatly reduce their threat of attack and minimize the need for manual analysis or maintenance.


How Security Teams Are Automating, According to a New SANS Survey

Automation did not enter popular lexicon until the 1940s, when Henry Ford introduced an official “automation department” at his Michigan car plant. But the concept dates back many years before that, most notably to the industrial revolution, where automation acting as a driver for improved productivity and time management planted its roots.


GitOps Progressive Security for ArgoCD with Alcide Kubernetes Advisor

GitOps is a paradigm that puts Git at the heart of building and operating cloud- native applications by using Git as the single source of truth. GitOps empowers developers to perform what used to fall under IT operations. GitOps, as a development pattern, gained a fair share of popularity in recent times as it emphasizes declaratively expressing infrastructure and application configuration within Git repositories GitOps.

SOC Quarantine Diaries: Rod Arthur, a Level III SOC Engineer, on Relying on Experience Amid Turmoil

Episode 2: Rod Arthur of Conduent joins SOC Quarantine Diaries to share how and his security operations teammates have leaned on experience and solid communication to ride out any bumps or disruptions presented by the current crisis.

A Tier III SOC Engineer on Multi-Tasking and Communication During an Extended Crisis (Video)

Episode 2 of “SOC Quarantine Diaries” welcomes Rod Arthur, a Level III SOC engineer at business process services company Conduent, for insight into someone on the front-lines of threat detection and response as businesses take on new cyber-risks from COVID-19. (Hint: Experience pays off.)


What is Incident Response? A 5-Step Plan to Resolve Security Events

In the context of cybersecurity, incident response refers to the tools, processes and methodologies that businesses use to respond to security events. Examples of such events include ransomware attacks, network breaches and phishing assaults. Although responsible security teams always strive to prevent incidents from occurring in the first place, the reality is that no organization can ever be immune to a successful attack.


How to Choose Incident Alert Management Tools for Your SOC

A security operations center (SOC) is the centralization of your security processes and tooling. It can enable you to monitor for, evaluate, and respond to incidents across your organization with increased efficiency and effectiveness. By centralizing your security efforts, you create greater visibility into your systems and can better analyze and detect threats. At the core of an SOC is your SOC team.

Managing the Entire SOAR Playbook Lifecycle

As your SOAR implementation matures and increases in value, your playbook library will develop and grow as well. Siemplify playbook lifecycle management makes maintaining, optimizing and troubleshooting playbooks at scale simple and easy. Unique capabilities, such as playbook run analytics, reusable playbook “blocks” and playbook versioning and rollback, ensure your SOAR implementation grows in value, not complexity.