The 5 Biggest Things Holding Back Security Operations Centers from Success

Smart, risk-minded organizations, when considering how to ensure the continuity of their business, hope for the best but prepare for…
The post The 5 Biggest Things Holding Back Security Operations Centers from Success appeared first on Siemplify.
The… Continue reading The 5 Biggest Things Holding Back Security Operations Centers from Success

Why Successful SOCs Detect Earlier and Respond Faster

  Of all the security operations center efficacy metrics, arguably none is more indicative than mean time to detect (MTTD)…
The post Why Successful SOCs Detect Earlier and Respond Faster appeared first on Siemplify.
The post Why Successful SOCs … Continue reading Why Successful SOCs Detect Earlier and Respond Faster

Powerful Case Management in the SOC: 4 Things You Need to Know

  Effective case management can be a real game-changer for your security operations center (SOC). Squared up against a complex…
The post Powerful Case Management in the SOC: 4 Things You Need to Know appeared first on Siemplify.
The post Powerfu… Continue reading Powerful Case Management in the SOC: 4 Things You Need to Know

Black Hat Recap: Automation is Key to Managing Threats and Scaling the Future of Security (Video)

Another Black Hat USA is in the books, and anyone leaving the festivities feeling apprehensive about the state of security…
The post Black Hat Recap: Automation is Key to Managing Threats and Scaling the Future of Security (Video) appeared first on S… Continue reading Black Hat Recap: Automation is Key to Managing Threats and Scaling the Future of Security (Video)

4 Straightforward Things Every SOC Should be Doing to Counter Phishing

Tim Condello, senior customer success manager at Siemplify, contributed to this post. A recent study found that 83 percent of…
The post 4 Straightforward Things Every SOC Should be Doing to Counter Phishing appeared first on Siemplify.
The post 4 Str… Continue reading 4 Straightforward Things Every SOC Should be Doing to Counter Phishing

5 Ways to Relieve Burnout in the Security Operations Center

Amid all the dismal headlines that have become routine reading for security professionals (such as this study, which referenced cybercrime…
The post 5 Ways to Relieve Burnout in the Security Operations Center appeared first on Siemplify.
The post 5 W… Continue reading 5 Ways to Relieve Burnout in the Security Operations Center

Introducing The Road to Security Operations Maturity: A Cyentia Institute Research Report

If you compare two companies that are similar in all of the key ways – size, industry, revenue – what…
The post Introducing The Road to Security Operations Maturity: A Cyentia Institute Research Report appeared first on Siemplify.
The pos… Continue reading Introducing The Road to Security Operations Maturity: A Cyentia Institute Research Report

How SOAR Helps You Save Time When Probing Malicious Insider Threats (Video)

  Security operations centers deal with a variety of cases, and one of the most uncomfortable is the insider threat…
The post How SOAR Helps You Save Time When Probing Malicious Insider Threats (Video) appeared first on Siemplify.
The post How S… Continue reading How SOAR Helps You Save Time When Probing Malicious Insider Threats (Video)

How to Harness the Benefits of Threat Hunting Despite the Security Skills Shortage (Video)

  Threat hunting is arguably one of the most overused and misunderstood terms in security. If you were to get…
The post How to Harness the Benefits of Threat Hunting Despite the Security Skills Shortage (Video) appeared first on Siemplify.
The p… Continue reading How to Harness the Benefits of Threat Hunting Despite the Security Skills Shortage (Video)

Using Deception and Automation to Reduce Attacker Dwell Time

In the treatise, “The Prince,” Niccolo Machiavelli, a 16th-century political theorist, muses about using deception to gain advantage over political…
The post Using Deception and Automation to Reduce Attacker Dwell Time appeared first on S… Continue reading Using Deception and Automation to Reduce Attacker Dwell Time