Looks Can Be Deceiving: Context and the New Normative in Log and Event Analysis

(The following is a guest post written by Alissa Knight, an ethical hacker, entrepreneur and author.) Is your SIEM or…
The post Looks Can Be Deceiving: Context and the New Normative in Log and Event Analysis appeared first on Siemplify.
The post Look… Continue reading Looks Can Be Deceiving: Context and the New Normative in Log and Event Analysis

What is Vulnerability Management?

IT infrastructure is more complex and interconnected than ever. For attackers, this provides a gold mine for easy attack vectors….
The post What is Vulnerability Management? appeared first on Siemplify.
The post What is Vulnerability Management? appe… Continue reading What is Vulnerability Management?

How Security Teams Are Automating, According to a New SANS Survey

Automation did not enter popular lexicon until the 1940s, when Henry Ford introduced an official “automation department” at his Michigan…
The post How Security Teams Are Automating, According to a New SANS Survey appeared first on Siempli… Continue reading How Security Teams Are Automating, According to a New SANS Survey

What is Incident Response? A 5-Step Plan to Resolve Security Events

In the context of cybersecurity, incident response refers to the tools, processes and methodologies that businesses use to respond to…
The post What is Incident Response? A 5-Step Plan to Resolve Security Events appeared first on Siemplify.
The post … Continue reading What is Incident Response? A 5-Step Plan to Resolve Security Events

What is SIEM? The Roadmap to a Better SOC

As the frequency and severity of data breaches continues to increase, and users become more concerned about privacy and the…
The post What is SIEM? The Roadmap to a Better SOC appeared first on Siemplify.
The post What is SIEM? The Roadmap to a Bette… Continue reading What is SIEM? The Roadmap to a Better SOC

3 Emerging Remote Security Use Cases Addressable with SOAR Playbooks

Even as many SOC teams have shifted to remote operations in recent weeks, the basics of their mission are unwavering:…
The post 3 Emerging Remote Security Use Cases Addressable with SOAR Playbooks appeared first on Siemplify.
The post 3 Emerging Remo… Continue reading 3 Emerging Remote Security Use Cases Addressable with SOAR Playbooks

A Compare-and-Contrast Between Next-Gen SIEM and SOAR

(The following is a guest post written by Alissa Knight, an ethical hacker, entrepreneur and author.) The average lifespan of…
The post A Compare-and-Contrast Between Next-Gen SIEM and SOAR appeared first on Siemplify.
The post A Compare-and-Contrast… Continue reading A Compare-and-Contrast Between Next-Gen SIEM and SOAR

Introducing a Technical Guide to Remote Security Operations

The widespread coronavirus-forced lockdown is unlikely the first time security operations teams have had to temporarily migrate away from physically…
The post Introducing a Technical Guide to Remote Security Operations appeared first on Siemplify.
Th… Continue reading Introducing a Technical Guide to Remote Security Operations

Security Orchestration, Automation and Response: Everything You Need to Know to Get Started

Security operations is a well-established discipline — many businesses have even had SecOps strategies in place for decades. Yet the…
The post Security Orchestration, Automation and Response: Everything You Need to Know to Get Started appeared … Continue reading Security Orchestration, Automation and Response: Everything You Need to Know to Get Started

SOC’ing from Home? How to Migrate to Remote Security Operations in the Age of Coronavirus

The coronavirus pandemic is reshuffling our priorities and changing life as we know it, and with the climax of the…
The post SOC’ing from Home? How to Migrate to Remote Security Operations in the Age of Coronavirus appeared first on Siemplify.
Continue reading SOC’ing from Home? How to Migrate to Remote Security Operations in the Age of Coronavirus