Introducing Gartner’s Tips for Selecting the Right Tools for Your Security Operations Center

The security operations center (SOC) is a complex place. For one, attaining efficiency is critical, considering time and effort are…
The post Introducing Gartner’s Tips for Selecting the Right Tools for Your Security Operations Center appeared … Continue reading Introducing Gartner’s Tips for Selecting the Right Tools for Your Security Operations Center

How Automation Can Help You Respond to Hacked Credentials Circulating the Dark Web

Much like the legitimate economy, the cybercriminal marketplace experiences ebbs and flows. Current factors working against it include the ripple…
The post How Automation Can Help You Respond to Hacked Credentials Circulating the Dark Web appeared fi… Continue reading How Automation Can Help You Respond to Hacked Credentials Circulating the Dark Web

What Is SIEM? What Is SOAR? How Do They Compare? Do You Need Both?

With all the acronyms floating around in cybersecurity, it is easy to get confused by what means what. Security information…
The post What Is SIEM? What Is SOAR? How Do They Compare? Do You Need Both? appeared first on Siemplify.
The post What Is SIE… Continue reading What Is SIEM? What Is SOAR? How Do They Compare? Do You Need Both?

8 Best Practices for Secure Remote Work Access

As more and more employees have transitioned to working remotely, the cybersecurity threats that their organizations face have changed. While…
The post 8 Best Practices for Secure Remote Work Access appeared first on Siemplify.
The post 8 Best Practi… Continue reading 8 Best Practices for Secure Remote Work Access

How SOAR Can Take Your Security Budget Further in Turbulent Times

When stay-at-home orders came down for much of the world in March, few businesses were spared the consequences of trying…
The post How SOAR Can Take Your Security Budget Further in Turbulent Times appeared first on Siemplify.
The post How SOAR Can Ta… Continue reading How SOAR Can Take Your Security Budget Further in Turbulent Times

Kraken CISO Nick Percoco on the crypto exchange’s “productive paranoia” and the future of protecting home networks (Video)

  Audio Version Episode 3 of SOC Quarantine Diaries catches up with veteran security mind Nick Percoco, whose renowned career…
The post Kraken CISO Nick Percoco on the crypto exchange’s “productive paranoia” and the future of p… Continue reading Kraken CISO Nick Percoco on the crypto exchange’s “productive paranoia” and the future of protecting home networks (Video)

Looks Can Be Deceiving: Context and the New Normative in Log and Event Analysis

(The following is a guest post written by Alissa Knight, an ethical hacker, entrepreneur and author.) Is your SIEM or…
The post Looks Can Be Deceiving: Context and the New Normative in Log and Event Analysis appeared first on Siemplify.
The post Look… Continue reading Looks Can Be Deceiving: Context and the New Normative in Log and Event Analysis

What is Vulnerability Management?

IT infrastructure is more complex and interconnected than ever. For attackers, this provides a gold mine for easy attack vectors….
The post What is Vulnerability Management? appeared first on Siemplify.
The post What is Vulnerability Management? appe… Continue reading What is Vulnerability Management?

How Security Teams Are Automating, According to a New SANS Survey

Automation did not enter popular lexicon until the 1940s, when Henry Ford introduced an official “automation department” at his Michigan…
The post How Security Teams Are Automating, According to a New SANS Survey appeared first on Siempli… Continue reading How Security Teams Are Automating, According to a New SANS Survey

What is Incident Response? A 5-Step Plan to Resolve Security Events

In the context of cybersecurity, incident response refers to the tools, processes and methodologies that businesses use to respond to…
The post What is Incident Response? A 5-Step Plan to Resolve Security Events appeared first on Siemplify.
The post … Continue reading What is Incident Response? A 5-Step Plan to Resolve Security Events