Splunk Unfurls Security Operations Center as Cloud Service

Splunk, after its recent announcement of intent to acquire TruSTAR to gain access to a cybersecurity analytics tool, today launched a security operations center (SOC) delivered as a cloud service. Jane Wong, vice president of product management for se… Continue reading Splunk Unfurls Security Operations Center as Cloud Service

CrowdStrike + Corelight partner to reach new heights

By Lana Knop, Chief Product Officer, Corelight Through our newly announced partnership with CrowdStrike, Corelight customers will be able to incorporate CrowdStrike’s best-in-class threat intelligence into Corelight Sensors to generate actionable alert… Continue reading CrowdStrike + Corelight partner to reach new heights

Setting up a SOC in the Midst of a Pandemic

Setting up a new business is never easy. Ask any entrepreneur and they will tell you about the sleepless nights, long hours and endless anxieties along the way. But, when starting a business in the midst of a global pandemic, each of these issues is m… Continue reading Setting up a SOC in the Midst of a Pandemic

4 Security Awareness Training Trends

The year 2020 was all about the pandemic. It pushed security teams to the edge, required creative problem-solving skills, great teamwork and investment and optimization of security tools. The year 2020 also showed organizations how important security … Continue reading 4 Security Awareness Training Trends

Security operations center, Part 3: Finding your weakest link

Any organization with data assets is a possible target for an attacker. Hackers use various forms of advanced cyberattack techniques to obtain valuable company data; in fact, a study by the University of Maryland showed that a cyberattack takes place …… Continue reading Security operations center, Part 3: Finding your weakest link

 Security operations center, Part 2: Life of a SOC analyst 

In the first part of this blog series, we saw a brief overview of what a security operations center (SOC) is and how it operates. In this part, we’ll take a look at the typical activities that SOC analysts carry …
The post  Security operations center, … Continue reading  Security operations center, Part 2: Life of a SOC analyst 

Remote SecOps May Improve Cloud Security

Has COVID-19 really changed the way we work and think about cybersecurity? As we approach the first anniversary of shutdowns and mandatory work-from-home (WFH) orders, it might be a little too early for a definitive answer. But research from Siemplify… Continue reading Remote SecOps May Improve Cloud Security

How to Choose the Right SOC 2 Auditor

The selection of a SOC 2 auditor can be daunting. How do you find one, what should you consider when choosing a SOC 2 auditor, and what interview questions should you ask them? Will they understand your unique environment, product or challenges? Ultim… Continue reading How to Choose the Right SOC 2 Auditor

Making Sense of the Security Sensor Landscape

Chris Calvert of Respond Software (now part of FireEye) outlines the challenges that reduce the efficacy of network security sensors. Continue reading Making Sense of the Security Sensor Landscape

Combat Alert Fatigue

Improve Productivity of Your SOC Personnel Through Menlo iSOC
I get it—it’s been a hard year for the cybersecurity industry. Covid-19 pushed users from a safe, central, hardened data center out to the edge of the network—literally overnight. We’ve… Continue reading Combat Alert Fatigue