Unleash the Power of MITRE for a More Mature SOC

The MITRE adversarial tactics, techniques and common knowledge (ATT&CK) framework brings pooled knowledge from across the cyber defense community, including revealing what threat actors are up to and how best you can defend against them. Let’s take a look at what MITRE offers and how this framework goes hand-in-hand with developing a security operations center (SOC) […]

The post Unleash the Power of MITRE for a More Mature SOC appeared first on Security Intelligence.

Continue reading Unleash the Power of MITRE for a More Mature SOC

How is Enterprise Security Like Writing a Novel?

Pen, paper and ink alone do not make a novel. In the same way, anti-malware, firewalls and SIEM tools alone do not make an enterprise secure. Too many organizations think that buying lots of security solutions and deploying them will make them secure. However, just having a security tool running does not make an enterprise […]

The post How is Enterprise Security Like Writing a Novel? appeared first on Security Intelligence.

Continue reading How is Enterprise Security Like Writing a Novel?

Cybersecurity Ethics: Establishing a Code for Your SOC

Since security intersects so much with privacy, cybersecurity ethics decisions should be on your mind at work.  Being part of a high-performing computer security incident response team (CSIRT) or security operations center (SOC) involves making big, intentional decisions. Increasing the maturity of your team is more than dropping a bag of shiny new tools and technology […]

The post Cybersecurity Ethics: Establishing a Code for Your SOC appeared first on Security Intelligence.

Continue reading Cybersecurity Ethics: Establishing a Code for Your SOC

How Open Security Can Make Threat Management More Efficient

Security operations center (SOC) teams struggle with an array of challenges. Too many tools can make the work too complex; and recruiting and retaining personnel can be hard amidst a skills shortage. Experts need to focus on using their skills to their fullest. But, an open approach can improve threat management in a way that […]

The post How Open Security Can Make Threat Management More Efficient appeared first on Security Intelligence.

Continue reading How Open Security Can Make Threat Management More Efficient

Break Down Walls in the SOC for Better Data Security

Data provides businesses the edge they need to unlock their full potential. In turn, employees seek access to data to drive better customer outcomes, become more efficient and increase profits. As these demands for access increase, so too does the need for matching data security controls. It is a strategic imperative for modern businesses to […]

The post Break Down Walls in the SOC for Better Data Security appeared first on Security Intelligence.

Continue reading Break Down Walls in the SOC for Better Data Security

SIEM Security Myths Debunked: SOC Hero or Zero?

Security information and event management (SIEM) is still integral to digital security. However, newer entrants to the market claim SIEM as we know it is dead. If this sounds familiar, you may remember the infamous statement in 2015 by the chief information security officer (CISO) of RSA, Eddie Schwartz, that SIEM was dead. It seems […]

The post SIEM Security Myths Debunked: SOC Hero or Zero? appeared first on Security Intelligence.

Continue reading SIEM Security Myths Debunked: SOC Hero or Zero?

How a Cybersecurity Training Program Can Recruit From Inside Your Business

The cybersecurity industry is facing a shortage of trained and experienced professionals. Schools, universities and organizations are doing amazing things to encourage the next generation to pursue a cybersecurity career. However, there is still a huge cybersecurity talent shortage. With the right training, this can change. It is clear that organizations require cybersecurity training for […]

The post How a Cybersecurity Training Program Can Recruit From Inside Your Business appeared first on Security Intelligence.

Continue reading How a Cybersecurity Training Program Can Recruit From Inside Your Business

A Quick Guide to Effective SIEM Use Cases

Part of successfully setting up your security operations center (SOC) is defining your SIEM use cases.  Use cases help and support security analysts and threat monitoring goals. What is a use case? A use case can be a mix of multiple technical rules within the SIEM tool, or can be a mix of actions from […]

The post A Quick Guide to Effective SIEM Use Cases appeared first on Security Intelligence.

Continue reading A Quick Guide to Effective SIEM Use Cases

Assessing Security Operation Centers Using a Balanced Scorecard

Measuring the effectiveness of a security operations center (SOC) can be a daunting task, but a balanced scorecard approach can make the task easier. Existing SOC best practice tends to focus on operational metrics, such as response and cycle times. However, a focus solely on these metrics can lead to blind spots where critical aspects […]

The post Assessing Security Operation Centers Using a Balanced Scorecard appeared first on Security Intelligence.

Continue reading Assessing Security Operation Centers Using a Balanced Scorecard

What’s My Priority? The Key Pillars of Threat Intelligence

Often, in the world of information security and risk management, the question facing threat intelligence teams is amidst this sea of vulnerability disclosures, which ones matter the most to my organization? Which can impact us the most? And, how do I best explain threats to internal stakeholders in a way that helps minimize risk? Reducing […]

The post What’s My Priority? The Key Pillars of Threat Intelligence appeared first on Security Intelligence.

Continue reading What’s My Priority? The Key Pillars of Threat Intelligence