3 Key Benefits of Automating the Grunt Work of Your Security Operations

It’s hard to believe that cars were once put together by hand, but it’s true. The early auto workers toiled with rudimentary equipment to build the first personnel vehicle to drive on four wheels. Due to the inordinate effort required to put together these lumbering beasts, only the very wealthy could afford such a luxury. That all changed with the introduction of the assembly line.


Incorporating the MITRE ATT&CK Framework into Your SOAR to Deliver Faster Investigations and Improved Visibility

Everyone involved in the triage, investigation and response to security incidents battles the same adversary: Time. Whether you are a Tier 1 analyst weeding out false positives or a senior analyst dissecting a sophisticated attack, the clock is always against you.


Sitdown with a SOC Star: 11 Questions with Cameron Rayner of Crowe LLP

There are many gifted security operations professionals in the world, grinding day after day, without much fanfare. Most, of course, are not attention-seekers by nature – if they were, they likely wouldn’t have chosen the cybersecurity career path – but far too many remain in the shadows, despite having so many valuable insights and anecdotes to share about their experiences and craft. We want to change that.


5 of the Spookiest Threats Entering Your Security Operations Center

Halloween is Thursday, but if you work in a security operations center, you might feel like every day is All Hallows’ Eve considering the level of dread that can greet you at any moment. The truth is that you’re probably not seeing the real scary stuff that your adversaries have to offer – why use a flashy zero-day exploit when something far more rudimentary works just as well – but that doesn’t mean hacks, breaches and other incidents have slowed in 2019.


How to Handle Shift Handovers in the Security Operations Center

Imagine being a patient in a hospital, and when your knowledgeable caretaker leaves for the day, the incoming attendant is unfamiliar with your condition, medication needs and other specifics about your case. Aside from the obvious anxiety and feelings of abandonment you would feel, you also would run the risk of receiving error-prone or incorrect treatment. Now think about cyber threats. They can happen at any time, and once they arrive, they aren’t always easily extinguishable.


Are you dealing with the symptoms or the cause of analyst burnout?

Organizations build a SOC – a dedicated, centralized team of security experts – to effectively detect and respond to advanced threats. However, as SOCs deal with evolving threats and an expanding attack surface, advancements in the stack have not kept pace and analysts are feeling the pain.


Introducing the No-Nonsense Guide to Security Operations Metrics

Few places inside the business demand metrics quite like the security operations center (SOC). Think about it: Not only has security become a mainstream subject within the business, necessitating the clear communication of critical messages around risk, it’s also a 24/7 environment complicated by a unique set of challenges requiring improvement direction.