How to Automate a Ransomware Response in 5 Steps
6 min read
October 14

As if organizations are not under enough pressure from ransomware purveyors, Check Point estimates that ransomware attacks have roughly doubled…

The 5 Biggest Security Operations Trends Shaping Today’s MSSP [Free Guide]
2 min read
October 12

Across the world, organizations are turning to MSSPs in surging numbers to help them own or extend cybersecurity coverage and…

How to Measure Effectiveness of Your Security Operations with SOAR and Business Intelligence (+Video)
5 min read
September 30

Rising above the daily firefighting to actually measure the effectiveness of your security operations is easier said than done. This,…

Key Takeaways from the 2020 Gartner Market Guide for SOAR
4 min read
September 23

The much-awaited 2020 Gartner Market Guide for Security Orchestration, Automation and Response (SOAR) Solutions has arrived! As you can expect…

How SOAR Can Treat the Cybersercurity Skills Shortage 
4 min read
September 15

Raise your hand if you are aware that a (worsening) massive global skills shortage is afflicting the cybersecurity industry, leaving…

SOC Quarantine Diaries Ep. 6: Block.One’s Eddie Schwartz
2 min read
September 9

Audio Version Episode 6 of SOC Quarantine Diaries catches up with security industry luminary Eddie Schwartz, who is CSO of…

Powerfully Simple SOAR for Service Providers [Video]
5 min read
September 3

Security service providers require a software-driven foundation to deliver high-quality services that impress customers. But building this foundation for your…

Responding to Cloud Misconfigurations with Security Automation and Common-Sense Tips
5 min read
September 1

Few things can boil the blood of a security professional quite like the unforced error. It is a common term…

Selecting the Best SOAR Solution Series: Case (Management) in Point (Part 3)
5 min read
August 21

Welcome to part 3 of our series examining how to select the best security, orchestration, automation and response (SOAR) solution…

How Your SOC Team Can Triumph With Tabletop Exercises [Free Guide]
2 min read
August 19

Among emergency responders, including in the realm of cyber, tabletop exercises are widely accepted as a reliable training activity for…

How Remote Work is Reshuffling Your Security Priorities and Investments
3 min read
August 13

Roughly five months into the pandemic, stark stories of unsustainability have emerged, from personal debt caused by months-long unemployment to…

Selecting the Best SOAR Solution Series: The 5 Core Competencies (Part 2)
5 min read
August 4

Welcome to part 2 of our series on how to select the best security, orchestration, automation and response (SOAR) solution…

SOC Pros Respond to Upskilling, Training and “Playing” with New Tech More than Money: SANS
3 min read
July 31

Money may talk for employees considering an exit from most professions, but according to new research, that doesn’t apply to…

Sy4 Security’s Keven Knight on Building a SOC Amid a Pandemic (Video)
1 min read
July 29

It is impossible for the timing of Sy4 Security’s launch to be lost on Keven Knight, COO of the U.K.-based…

Selecting the Best SOAR Solution Series: What’s in a Name? (Part 1)
4 min read
July 22

Security orchestration, automation and response, commonly known as SOAR, is one of the most talked about technologies in cybersecurity these…

Introducing Gartner’s Tips for Selecting the Right Tools for Your Security Operations Center
2 min read
July 16

The security operations center (SOC) is a complex place. For one, attaining efficiency is critical, considering time and effort are…

How Automation Can Help You Respond to Hacked Credentials Circulating the Dark Web
4 min read
July 13

Much like the legitimate economy, the cybercriminal marketplace experiences ebbs and flows. Current factors working against it include the ripple…

What Is SIEM? What Is SOAR? How Do They Compare? Do You Need Both?
4 min read
July 6

With all the acronyms floating around in cybersecurity, it is easy to get confused by what means what. Security information…

Veteran CISO Tammy Moskites on Budgets, Incident Spikes and the “Best BC/DR Experience of Our Lives” (Video)
1 min read
July 1

Before COVID-19 arrived, Tammy Moksites was a road warrior, hand-shaker and self-professed big hugger. So while she misses how life…

How to Take Command During a Security Crisis (+Video)
3 min read
June 24

A successful response to a cybersecurity crisis scenario requires having a central integration hub where incidents are managed by security…

8 Best Practices for Secure Remote Work Access
8 min read
June 16

As more and more employees have transitioned to working remotely, the cybersecurity threats that their organizations face have changed. While…

How SOAR Can Take Your Security Budget Further in Turbulent Times
6 min read
June 12

When stay-at-home orders came down for much of the world in March, few businesses were spared the consequences of trying…

We’ve SOARed and SOARed, and Now We’ve Reached the Cloud
4 min read
June 10

  Today marks a big day for Siemplify with the official launch of Siemplify Cloud – the cloud-native security operations…

Preventing Data Exfiltration: Definition, Examples and Best Practices
10 min read
June 9

As one of the biggest threats to data security, data exfiltration has the potential to result in devastating outcomes for…

Kraken CISO Nick Percoco on the Crypto Exchange’s “Productive Paranoia” and the Future of Protecting Home Networks (Video)
2 min read
June 3

  Audio Version Episode 3 of SOC Quarantine Diaries catches up with veteran security mind Nick Percoco, whose renowned career…

Looks Can Be Deceiving: Context and the New Normative in Log and Event Analysis
8 min read
June 2

(The following is a guest post written by Alissa Knight, an ethical hacker, entrepreneur and author.) Is your SIEM or…

What is Vulnerability Management?
7 min read
May 28

IT infrastructure is more complex and interconnected than ever. For attackers, this provides a gold mine for easy attack vectors….

How Security Teams Are Automating, According to a New SANS Survey
3 min read
May 27

Automation did not enter popular lexicon until the 1940s, when Henry Ford introduced an official “automation department” at his Michigan…

A Tier III SOC Engineer on Multi-Tasking and Communication During an Extended Crisis (Video)
1 min read
May 21

  Episode 2 of “SOC Quarantine Diaries” welcomes Rod Arthur, a Level III SOC engineer at business process services company…

What is Incident Response? A 5-Step Plan to Resolve Security Events
9 min read
May 20

In the context of cybersecurity, incident response refers to the tools, processes and methodologies that businesses use to respond to…

What is SIEM? The Roadmap to a Better SOC
8 min read
May 15

As the frequency and severity of data breaches continues to increase, and users become more concerned about privacy and the…

GDS SOC Leader Tracey Webb on Putting “the Fear of God” in Remote Workers and Leaning Into a New Normal (Video)
2 min read
May 13

Welcome to the first episode of SOC Quarantine Diaries, a new virtual video series presented by Siemplify that examines life…

SOC 101: Getting Started with Playbook Design (Video)
1 min read
May 11

  Every artist starts with a blank canvass. That goes for security operations teams, as well, who must illustrate their…

Show How Much You Miss the SOC With Our Custom Zoom Background
2 min read
May 6

When forced remote work began, employees around the world were introduced to the joys of video conferencing. It has now…

3 Emerging Remote Security Use Cases Addressable with SOAR Playbooks
5 min read
May 5

Even as many SOC teams have shifted to remote operations in recent weeks, the basics of their mission are unwavering:…

A Compare-and-Contrast Between Next-Gen SIEM and SOAR
11 min read
April 28

(The following is a guest post written by Alissa Knight, an ethical hacker, entrepreneur and author.) The average lifespan of…

Introducing a Technical Guide to Remote Security Operations
2 min read
April 27

The widespread coronavirus-forced lockdown is unlikely the first time security operations teams have had to temporarily migrate away from physically…

SOC 101: Building Your SOC with People, Processes and Technology (Video)
1 min read
April 22

  Your security operations relies on people, of course, but it also fundamentally leans on processes and technology to succeed….

Security Orchestration, Automation and Response: Everything You Need to Know to Get Started
9 min read
April 15

Security operations is a well-established discipline — many businesses have even had SecOps strategies in place for decades. Yet the…

9 Security Orchestration and Automation Benefits: How SOAR Helps Improve Incident Response
6 min read
April 7

On average, 800 attacks per hour pummel 76 U.K. councils, according to global insurance firm Gallagher. That volume of attacks…

How Cybercriminals Are Actively Exploiting the Coronavirus/COVID-19 Crisis
4 min read
April 1

Security researchers around the world have their work cut out for them keeping track of malicious scams and campaigns surrounding…

An Insider’s Look at MISP for Open-Source Threat Intelligence (Video)
1 min read
March 27

Siemplify Technical Account Manager Arnaud Loos builds on his “Open-Source SOC” whiteboard video with a deep dive into the Malware…

Product Update: What’s New in Siemplify v5.5
3 min read
March 25

Today we announced the general availability of v5.5 of the Siemplify Security Operations Platform. Like all our major releases, the…

SOC’ing from Home? How to Migrate to Remote Security Operations in the Age of Coronavirus
7 min read
March 24

The coronavirus pandemic is reshuffling our priorities and changing life as we know it, and with the climax of the…

Introducing the All-in-One Guide to Maturing Your MSSP
2 min read
March 17

The managed security services market is booming. If you have recently joined this hot marketplace, congratulations, it is an exciting…

Feature Spotlight: Using the Siemplify Integrated Development Environment
3 min read
March 16

In a perfect world, every security product you brought into your environment would meet every one of your needs right…

The Open-Source SOC (Whiteboard Video)
1 min read
March 6

  Siemplify Technical Account Manager Arnaud Loos is back with another whiteboard, this one building on his previous discussion around…

3 Unique Causes of Burnout for Security Operations Professionals
4 min read
March 4

Burnout is a condition that transcends industries. But Amanda Berlin, CEO of Mental Health Hackers, a nonprofit whose mission is…

4 Ways the Coronavirus May Affect Cybersecurity Operations
5 min read
March 3

Security operations professionals are used to staying on top of the latest computer viruses and other malware targeting the organization’s…

The Unintended SecOps Consequences of Digital Transformation
4 min read
February 19

Between networks, endpoints, cloud technologies and critical infrastructure, digital footprints are growing for virtually every organization. This means greater efficiency…

How Security Orchestration Supercharges Your SOC
8 min read
February 13

A security operations center (SOC) is responsible for preventing any cybersecurity breaches in an organization’s network. This huge undertaking involves…

Getting to Know Your Data With Elasticsearch (Whiteboard Video)
1 min read
February 12

Welcome to the first installment of our revamped whiteboard series! The show-and-tell nature of these videos, plus their relatively fast-paced…

Sitdown with a SOC Star: 11 Questions with Chris Elliot of Hulu
9 min read
February 5

When you hit the couch to binge a new TV series, the last thing you’re likely thinking about is that…

Introducing the Art of Recognizing and Surviving SOC Burnout: A Complete Manual for Security Operations Professionals [Interactive E-Book]
3 min read
January 30

I quit my job because of burnout Burnout can hurt your heart, literally Is burnout actually a form of depression? …

Why Playbook Lifecycle Management is the New Feature Your SOAR Technology Needs
3 min read
January 22

As security operations centers (SOCs) broaden their implementation of security orchestration, automation and response (SOAR) technology to automate some, or…

Iranian Retaliatory Cyber Threats Are a Reminder of the Importance of Sound Incident Response
3 min read
January 17

As if security operations professionals don’t have enough on their plates, they can add a new geo-political event — the…

The Difference Between SOAR and a Security Operations Platform
6 min read
January 6

When an innovative product hits the market, it does not take long for the market to become overrun with similar…

The 7 Most-Read Siemplify Blog Posts Published in 2019
3 min read
December 31

The Siemplify Blog is one of the easiest and most prolific ways we communicate with the security operations community at…

Infographic: The Past, Present and Future of the SOC
1 min read
December 19

The security operations center, ground zero for addressing cyberthreats, has been around roughly only as long as the modern internet….

A New Approach to Managing the Lifecycle of Your Security Operations Playbooks (Video)
3 min read
December 17

  We are all aware that security operations centers are inundated with alerts causing massive case backlogs and potentially critical…

Product Update: What’s New in v5.3 of the Siemplify Security Operations Platform
1 min read
December 11

    If you are like most security professionals, you are hoping to get a little downtime before the end…

Sitdown with a SOC Star: 11 Questions with Jesse Emerson of Trustwave
10 min read
December 10

Welcome back to our continuing Q&A series – “Sitdown with a SOC Star” – in which we pose 21 questions…

Automatic for the SOC People: How Automation Can Quell Those Pesky False Positives
5 min read
December 5

This post first appeared in Cyber Defense Magazine’s December edition.  As a newly hired cybersecurity analyst, you’re excited to start…

Expert Advice to Help Security Operations Centers Survive the Holidays
4 min read
November 27

‘Tis the season for giving thanks, holiday cheer and … cyberthreats. One of those three probably isn’t on your wish…

What a Doctor’s Visit Can Teach Your SOC About Reducing MTTD and MTTR
8 min read
November 25

Recently I took my 4-year-old daughter to the doctor’s office for a run-of-the-mill ear infection. Generally our wait time with…

How to Convince Your Executives and Board to Support Security Operations
5 min read
November 19

Whether you have stood up an in-house security operations center (SOC), outsource your efforts to a managed security services provider,…

3 Key Benefits of Automating the Grunt Work of Your Security Operations
7 min read
November 13

It’s hard to believe that cars were once put together by hand, but it’s true. The early auto workers toiled…

Incorporating the MITRE ATT&CK Framework into Your SOAR to Deliver Faster Investigations and Improved Visibility
3 min read
November 7

  Everyone involved in the triage, investigation and response to security incidents battles the same adversary: Time.  Whether you are…

Sitdown with a SOC Star: 11 Questions with Cameron Rayner of Crowe LLP
10 min read
November 6

There are many gifted security operations professionals in the world, grinding day after day, without much fanfare. Most, of course,…

5 of the Spookiest Threats Entering Your Security Operations Center
4 min read
October 31

Halloween is Thursday, but if you work in a security operations center, you might feel like every day is All…

How to Handle Shift Handovers in the Security Operations Center
4 min read
October 29

Imagine being a patient in a hospital, and when your knowledgeable caretaker leaves for the day, the incoming attendant is…

5 Awesome Resources to Sharpen Your Security Operations Know-How
2 min read
October 18

Learning never takes a break. Here are five instructive, compelling and – most important of all – practical resources that…

Infographic: The Anatomy of Security Operations Pro
2 min read
October 16

A unique genetic makeup is required to be a security operations professional. Analysts, engineers, managers act as the primary digital…

Introducing the No-Nonsense Guide to Security Operations Metrics
2 min read
October 10

Few places inside the business demand metrics quite like the security operations center (SOC). Think about it: Not only has…

Uncovering Hidden Threats with Endgame and the Siemplify Security Operations Platform
3 min read
October 9

  In a perfect world, security operations center (SOC) teams would always be one or two steps ahead of attackers,…

How to Prepare Your Security Operations for the Continuing IoT Upsurge
5 min read
October 3

Cloud computing has caused headaches for businesses across the globe. But just as we begin to understand the complex nature…

Extending the Value of Your SentinelOne Deployment with Siemplify
2 min read
September 26

  If you follow innovation in the security space, you would be hard pressed not to have heard of SentinelOne…

How Security Operations Teams Are Winning Amid SOC Challenges (Video)
1 min read
September 24

  Alert fatigue, skills shortages, process shortfalls and budget restrictions are all working against the security operations center (SOC), which…

Product Update: What’s New in Version 5.1 of the Siemplify Security Operations Platform
3 min read
September 18

  Security professionals are constantly inundated with information about “breakthrough” products claiming to “change the face” of <insert product category…

The 5 Biggest Things Holding Back Security Operations Centers from Success
6 min read
September 16

Smart, risk-minded organizations, when considering how to ensure the continuity of their business, hope for the best but prepare for…

Feature Spotlight: Using the Siemplify Expression Builder
1 min read
September 9

  Part of the challenge security analysts face when completing investigations is ensuring they have all the data needed to…

SOC Automation 101: How to Use SOAR to Overcome Time-Consuming Tasks and Address Alerts (Video)
2 min read
September 4

  With the introduction this year of so-called “robot umpires” into professional baseball – as part of an experiment in…

CrowdStrike & Siemplify: Integrating Endpoint Protection and SOAR
2 min read
September 3

  Recently leading analyst firm Gartner released its annual Magic Quadrant (MQ) for Endpoint Protection Platforms (EPP). Decision-makers look to…

Why Successful SOCs Detect Earlier and Respond Faster
5 min read
August 29

  Of all the security operations center efficacy metrics, arguably none is more indicative than mean time to detect (MTTD)…

Carbon Black and Siemplify: Next-Gen AV and EDR Meets SOAR
2 min read
August 28

  Attackers love endpoints. Protecting your endpoints from the continuous onslaught of attacks can drastically reduce the available attack surface….

Connecting the SOC to IT With Digital Workflows via ServiceNow
3 min read
August 28

A common challenge security operations centers face is competing remediation and recovery actions fast. If the analyst has the authority…

Powerful Case Management in the SOC: 4 Things You Need to Know
1 min read
August 23

  Effective case management can be a real game-changer for your security operations center (SOC). Squared up against a complex…

The Difference Between Alert-Centric vs. Threat-Centric SOAR (Video)
4 min read
August 20

After years of investing in best-of-breed detection and SIEM tools, security operations centers are buried in alerts, giving rise to…

Black Hat Recap: Automation is Key to Managing Threats and Scaling the Future of Security (Video)
2 min read
August 14

  Another Black Hat USA is in the books, and anyone leaving the festivities feeling apprehensive about the state of…

What Siemplify Has in Store at Black Hat USA 2019
2 min read
July 30

Security professionals, not grasshoppers, are just days away from descending on Las Vegas for the annual Black Hat USA conference….

Siemplify and Intezer: Incorporate Genetic Malware Analysis into Your SOAR Platform (Video)
2 min read
July 26

  One of the most common and time-consuming cases security operations centers (SOCs) must complete daily are malware investigations. Part…

How Playbooks Can Drive Consistent and Repeatable Investigations in the SOC (Video)
3 min read
July 22

      In an ideal world, every analyst in your security operations center would have the ability to always…

4 Straightforward Things Every SOC Should be Doing to Counter Phishing
5 min read
July 16

Tim Condello, senior customer success manager at Siemplify, contributed to this post. A recent study found that 83 percent of…

All the Ways to Combine Symantec and Siemplify to Drive Security Operations (Video)
2 min read
July 12

  Effective orchestration and automation can drive security teams’ productivity through the roof.  From automating time-consuming, mundane manual tasks to…

How to Get the Most out of Malware Investigations With SOAR (Video)
2 min read
July 10

  Every day, more than 350,000 malicious and unwanted programs emerge, or roughly one for every person living in Honolulu….

Key Takeaways from the Gartner 2019 Market Guide for SOAR
3 min read
July 8

Last week marked another major milestone for the security orchestration, automation and response (SOAR) market: Gartner issued its first-ever Market…

5 Ways to Relieve Burnout in the Security Operations Center
6 min read
July 3

Amid all the dismal headlines that have become routine reading for security professionals (such as this study, which referenced cybercrime…

How to Manage a Companywide Security Crisis from the SOC (Video)
1 min read
June 28

  So you’ve been breached. Putting aside the fact that your security infrastructure failed to prevent it from happening, you…

Introducing The Road to Security Operations Maturity: A Cyentia Institute Research Report
2 min read
June 26

If you compare two companies that are similar in all of the key ways – size, industry, revenue – what…

How SOAR Helps You Save Time When Probing Malicious Insider Threats (Video)
2 min read
June 19

  Security operations centers deal with a variety of cases, and one of the most uncomfortable is the insider threat…

How to Harness the Benefits of Threat Hunting Despite the Security Skills Shortage (Video)
2 min read
June 14

  Threat hunting is arguably one of the most overused and misunderstood terms in security. If you were to get…

Using Deception and Automation to Reduce Attacker Dwell Time
4 min read
June 13

In the treatise, “The Prince,” Niccolo Machiavelli, a 16th-century political theorist, muses about using deception to gain advantage over political…

How You Can Take Your SOAR to the Next Level
3 min read
June 6

Security orchestration and response (SOAR) solutions are quickly becoming a must-have for security operations centers large and small. Due to…

Why Your Cybersecurity Use Cases Should Span the Lifecycle of a Threat
3 min read
June 4

Typically when security operations teams think about security use cases, they focus on detection scenarios, thanks to the shift underway…

How Alert Grouping Can Help You Deal with Security Stack Complexity (Video)
3 min read
May 31

  If you are like me, you spend at least a few minutes each day checking social media sites for…

3 Ways Automation and Orchestration Can Help You Stem the Insider Threat
4 min read
May 30

It’s easy for businesses to overestimate the risk posed by external threats and underrate the insider threat hazard. After all,…

How to Streamline Phishing Investigations in the SOC (Video)
2 min read
May 24

  One thing security professionals hate is wasting time. With a continuous stream of alerts flowing into your security operations…

How the “Diamond Model” Can Help SOC Analysts Boost Incident Response
4 min read
May 22

If it hasn’t happened to you yet, it will: Attackers have breached your defenses and are stalking your network. What…

Siemplify Raises $30M to Take Security Operations to the Next Level
2 min read
May 20

Big day today at Siemplify! We just announced that we have raised $30 million in Series C funding. This injection…

3 Types of Collaboration That Need to Be Originating from Your Security Operations Center
3 min read
May 17

Each year, right around the time when winter turns to spring in the United States, 64 college basketball teams stage…

How Siemplify Uses Machine Learning to Drive SOC Efficiency
3 min read
May 15

The promise of machine learning in cybersecurity, specifically inside the security operations center, is vast, but let’s not get ahead…

Vulnerability Management and SOAR
2 min read
May 3

Integrating Vulnerability Management into your SOAR to shorten investigation time Vulnerability Management has come along way in recent years. Once…

That’s a Nice SOAR Budget You Have There… Pity if Something Were to Happen to It
6 min read
April 23

So you took the proactive step to get a budget and purchase a SOAR, congratulations. The funny thing about budgets…

How to complete an investigation from the Siemplify Security Operations Platform Explorer View
5 min read
March 14

Security analysts are always looking for ways to speed up the investigation process. With alerts streaming into the SOC continuously…

Siemplify and the Palo Alto Application Framework Making case investigation and response fast
2 min read
March 13

Seconds. That’s all it takes for an attacker to exploit a vulnerability in a security framework. Once safely inside the…

4 Things SOC Managers Should CARE About in 2019
1 min read
January 14

[Originally appeared on Security Boulevard] New Year resolutions in our business lives typically require more careful planning compared to our…

Why Enterprises Should Consider NOC/SOC integration
3 min read
November 21

Enterprises Can Gain Significant Efficiencies and Increased Effectiveness through NOC/SOC Integration   Approximately 80% of organizations with a security operations…

Most Used Playbooks – Incident Response, Alert & Automation
2 min read
November 16

The Most Used Playbook series brings you the production playbooks noted by our professional services team as being most utilized and favored…

What Machine Learning Means for Security Operations
7 min read
October 4

Machine learning holds great promise for security operations Over the past two years machine learning has found its place firmly…

Building a Holistic Cybersecurity Metrics Program
7 min read
September 27

An organization’s ability to discover and reduce risk in a more preventative manner rests heavily on having clear cybersecurity and…

Introducing Siemplify v4.25
3 min read
September 25

You ask and we deliver. Siemplify version 4.25, the latest release of our award-winning security orchestration, automation and response (SOAR)…

How to Get More from Your Existing Security Technologies
5 min read
September 19

The cybersecurity sprawl struggle is real. Quick – name 50 things that you’re really good at.

Security Operations Strategies for Winning the Cyberwar
4 min read
September 14

Thwarting cyber threats just takes a little security operations strategy Advice for staying ahead of cyber threats abounds, yet most…

Security Automation Saves Money, Time and Work
7 min read
September 5

Security automation means a more efficient SOC, improving the bottom line The evolving threat landscape just gets more complex and…

Security Operations Challenges Impeding SOC-cess – 2018 SANS Survey
5 min read
August 24

Lack of effectiveness metrics and orchestration/automation top list of security operations frustrations The more things change, the more they stay…

What You Should Know about Driving Down MTTD and MTTR
6 min read
August 16

Effectively connect people, process and technology to minimize MTTD and MTTR There’s a reason it’s said that what gets measured…

Do I Need a SIEM if I Have SOAR?
5 min read
August 14

Another year, another Black Hat has come and gone. On the show floor, we saw the continued momentum and interest…

Creating a Foundation for Proactive Incident Response
6 min read
August 8

As a Boy Scout, you’re trained to be prepared – always in a state of readiness in mind and body…

Security Orchestration as a Catalyst for MSSP Speed to Market
5 min read
August 3

Security Orchestration Accelerates MSSP Scalability & New Service Development The market for managed security services grew 9.5% in 2017, the…

5 SOAR Implementation Pitfalls to Avoid
8 min read
July 23

The benefits of security orchestration, automation and response (SOAR) are many – if executed correctly There’s no doubt, organizations around…

Putting Your Incident Response Processes to the Test
7 min read
July 8

Are You Regularly Testing Your Incident Response Processes?     Surely you remember it well. Your class being gathered and…

Selecting a Security Orchestration Vendor
11 min read
June 8

Have a clear criteria list when selecting a security orchestration vendor Security orchestration, automation and response (SOAR) vendors offer SOCs…

Automated Incident Response – How Enterprises Benefit from it?
7 min read
May 30

Automated Incident Response Addresses Key Security Operations Inefficiencies In this era where cyber threats occur rapidly and nonstop, combining incident…

SOARing Above the Clouds of GDPR Compliance | Siemplify
5 min read
May 25

Security Orchestration Help Get Organizations Closer to GDPR Compliance Happy GDPR Day! You’re ready, right? Kicked back, feeling relaxed and…

Security Orchestration for the Cloud
3 min read
May 24

Continuously Innovating Security Orchestration and Automation The Siemplify team is always adding and improving features based on feedback from our…

The Role of Security Orchestration in Managed Detection | Siemplify
6 min read
May 14

Managed detection and response (MDR) is a fast-growing managed security offering focused on detecting and responding to threats that have…

Anguish and Antidote – Overcoming Top CISO Challenges | Siemplify
6 min read
May 2

  “Here’s What’s Keeping Your CISO Up at Night” “CISO Survey Paints a Grim Picture” “Thirty-seven CISO Pain Points”

Should You Stop Hiring Tier 1 SOC Analysts?
8 min read
April 17

  Much has been written about the death of the Tier 1 SOC analyst. To paraphrase Mark Twain, reports of…

Security Automation for Account Misuse | Siemplify
6 min read
April 12

Automating the triage and incident response for account misuse alerts Well, here we are. Our fourth and final installment of…

Automate This: Security Automation for DLP Alerts | Siemplify
6 min read
April 5

Automating the triage and incident response for DLP alerts   Hey there, welcome back! We now proceed with the third…

Security Automation for Malware Alerts
7 min read
March 30

Automating the triage and incident response for malware alerts Welcome to the second post in our four-part blog series where…

What SOC Managers Should Know about SOAR and Threat Intel | Siemplify
6 min read
March 28

“Information is a source of learning. But unless it is organized, processed, and available to the right people in a…

Security Automation for Phishing Alerts | Siemplify
8 min read
March 23

Automating triage and incident response of phishing alerts Security orchestration and automation is an undeniably hot topic. Forrester named it…

Your MSSP security orchestration shopping list | Siemplify
5 min read
March 19

To say that MSSPs have a security orchestration challenge is the understatement of the century. But not just any security…

BACK TO BASICS: What is security automation? | Siemplify
7 min read
March 12

Cybersecurity is full of terms, concepts, buzzwords, and jargon that often get misused, overstated or muddled. That’s why, every now…

Back to Basics: What is Security Orchestration?
7 min read
March 8

Some things just go together. Peanut butter and jelly. Gin and tonic. Bacon and more bacon. The same is true…

Are Cybersecurity Tools Enough? | Siemplify
5 min read
February 23

Thousands of tools to choose from, but nearly half of security alerts go uninvestigated. Feel familiar? Hunters are fond of…

SOARing above the Security Talent Shortage
4 min read
January 3

A lot has been said and written about the security talent shortage. A report by Cisco pegged the number of…

Gartner releases SOAR Innovation Insight research | Siemplify
2 min read
December 14

Last week marked an important milestone for the Security Orchestration and Automation market. Gartner Research issued their most comprehensive research…

Impact of Security Orchestration & Automation on MSSPs
5 min read
December 6

When strategizing about methods of orchestration and automation, the industry often focuses on the needs of the traditional security operations…

Are CISOs Ready to Trust Security Automation?
5 min read
November 21

  For CISOs trying to keep a hold on securing the information and systems of their company, automating their security…

Symantec and Siemplify Team Up
2 min read
October 11

Symantec and Siemplify are excited to announce a partnership to deliver a fully integrated solution for threat management.    

Understanding the SOC Team Roles And Responsibilities
6 min read
September 20

Building an effective security operations center (SOC) is crucial for organizations of all sizes. Just like the companies themselves, every…

Castle Ventures announced of ThreatNexus – to drive Security Orchestration
3 min read
September 7

NEW YORK–(BUSINESS WIRE)–Siemplify™, the leader in Security Orchestration & Automation, and Castle Ventures, a leading Data Security and Managed Security…

Most Used Playbooks: Using SOAR to Identify Phishing Attacks
2 min read
August 21

The Most Used Playbook Of 2017 series brings you the production playbooks noted by our professional services team as being most…

The Phenomenon of Phishing Attacks: How to Protect Yourself
4 min read
August 2

Phishing attacks are nothing new and a stalwart of the hacker repertoire. The proliferation of phishing attacks both simple and…

3 Best Ways to Approach Security Incident Management
4 min read
July 27

The landscape of Security Incident Management has altered drastically Ten years ago, the term “security incident management” was not commonplace…

Siemplify Announces the Deployment of ThreatNexus 2.0
3 min read
July 20

The demands and challenges within the scope of security operations are quite fierce. The problems plaguing security operations: alert fatigue,…

Why is Cyber Security Important – How To Avoid Threats
4 min read
July 19

In the ever growing battlefield of cyber security, it is nearly impossible to quantify the reasons why cyber security is…

Carbon Black and Siemplify Announce Integration Partnership
2 min read
July 14

Carbon Black and Siemplify are excited to announce a partnership to deliver a fully integrated solution for incident response.

4 Best Practices For Building a Security Operations Center
8 min read
July 9

You have to know four things before building anything, whether it’s something “simple” like assembling your new furniture from IKEA…

The Next Stage Of Security Automation – How Will It Evolve
5 min read
July 3

Before an organization can begin to analyze the benefits of security automation, a quick reminder of the threat faced by…

Petya Ransomware – How To Best Approach This Global Threat
4 min read
June 29

The recent cyber-attack caused disruption around the globe and has infected companies in an estimated 64 countries, including major banks,…

Siemplify partners with Palo Alto Networks for the launch of PAN App
2 min read
June 21

Palo Alto Networks recent 2017 Ignite Conference in Vancouver truly lived up to its namesake. The conference is a firestorm…

Ransomware Attack Stuns the Globe, Security Orchestration-The Answer
3 min read
May 12

Hospitals throughout the UK were alerted early Friday morning of a potential ransomware attack, but by the time anyone could…

Security Orchestration Made Simple: Effective Implementation Processes
6 min read
April 27

The challenges faced by a security operations center (SOC) are many and well-documented:the workload is tremendous, while the workforce is limited,…

The Top Priority Procedures For Incident Response
5 min read
April 25

Cybersecurity has become an increasingly challenging landscape to navigate. Having said that, there has been a constant evolution from conventional…

New Research On Security Orchestration, Automation & Incident Response
4 min read
April 24

In early 2017, Siemplify, in partnership with Enterprise Strategy Group (ESG), conducted extensive research on the priorities and challenges within…

Darkreading interviews Siemplify CEO Amos Stern on ESG Research
1 min read
April 13

Half of Security Pros Ignore Some Important Alerts Short-staffed, more than half of organizations admit they ignore alerts that should…

New York Department of Financial Services Cyber Security Regulation
4 min read
April 4

Security Orchestration addresses latest cybersecurity regulation plaguing financial services industry.

From SIEM to Security Orchestration
4 min read
March 22

Over the last decade, SIEM solutions have been the cornerstone of security operations.  As investments in detection rose, these systems…

Security Operations Challenges and Priorities for 2017
3 min read
March 6

We are only a few months into 2017, and cybersecurity issues continue to occupy news headlines. “America has a ‘cybersecurity…

3 Essential Things To Include In Your Cyber Security Strategy
5 min read
March 4

In this day and age, we are constantly playing keep up with technology. On a personal and a workplace level,…

How to Build a Cyber Incident Response Plan | Siemplify
8 min read
February 16

Planning is Vital to a Successful Cyber Incident Response Program Before embarking on anything new – buying a new house,…

Siemplify Wins 2017 Cutting Edge Incident Response Solution.
2 min read
February 14

Cyber Defense Magazine has announced that Siemplify has won the 2017 Award for Most Cutting Edge Incident Response Solution. Siemplify…

Siemplify Awarded Fastest Growing Cyber Security Company
2 min read
February 10

In recognition of our accelerated growth and market demand Siemplify has been awarded the 2017 CyberSecurity Excellence Award for Fastest…

451 Research features Siemplify’s security orchestration platform
1 min read
February 3

New report says “Siemplify SOC orchestration targets process quality and breadth, and analyst productivity.”

Webinar-Next Generation Analyst for Next Generation Threats
1 min read
February 2

Webinar Overview Security teams are challenged by a deluge of alerts straining both infrastructure and personnel. Managing a SOC requires…

Siemplify at RSA – What to Look for
2 min read
January 26

Each year the security world descends on San Francisco for RSA – a week long showcase of products, people, parties…

Top Cyber Security Threats in 2017 – Siemplify
7 min read
January 19

With 2016 bringing political polarization into cybersecurity, we take a look into the top global cybersecurity threats in 2017 Now…

How Leading Organizations Leveraging Security Orchestration
1 min read
January 10

Webinar: Next generation analysts for next generation threats – lessons from deploying best practices to hundreds of SOC teams! Tuesday,…

Siemplify makes top 10 list of cyber security companies
1 min read
January 10

Momentum Partners, a Cybersecurity focused advisory firm based in Silicon Valley has recognized Siemplify in their “Cyber Security Watch List” in acknowledgment of…

Siemplify Nominated for 2017 Cyber Defense Magazine InfoSec Awards
1 min read
January 10

Siemplify is a proud nominee for the 2017 Cyber Defense Magazine InfoSec Awards in the Incident Response Category. Kicking off…

APPLYING SECURITY ORCHESTRATION AND AUTOMATION FOR BETTER ROI
5 min read
January 4

  It’s no secret that security operations are under fire. In most enterprises, the only thing standing between a normal…

Driving ROI from Threat Intelligence & Security Operations
5 min read
December 28

Over the last few years, the issue of corporate cybersecurity has gone high profile and accordingly, budgets allotted to combating…

InfoSecurity Magazine Webinar: The future of Security Operation
3 min read
December 7

A Million Analysts Won’t Save Your SOC: The Future of Security Operations It’s no secret that companies across the world…

What is Cyber Ontology? Deliver context for Orchestration
6 min read
December 7

The modern Security Operations Center (SOC) is a highly complex system of point tools, all designed to keep sensitive corporate…

Duplicate Alerts Drain Your Security Analyst’s Time
2 min read
November 22

NEW RESEARCH SHOWS THAT 30 PERCENT OF ANALYSTS’ MANPOWER IS LOST TO DUPLICATE ALERTS As cyber attacks continue to expand…

Putting Threat Intelligence to Work
3 min read
November 8

Last month I attended the FS-ISAC Fall Summit and was thrilled to see the overwhelming interest in making security operations more…

Preparing for Cyber Attacks on our Power Grids
4 min read
October 27

This month we participated in NERC’s 2016 annual Grid Security Conference bringing together cybersecurity and physical security experts from industry and government…

A Million Security Analyst Won’t Save Your SOC
5 min read
October 25

It’s no secret that companies across the world face serious challenges when it comes to designing and maintaining their Security…

Why it’s so difficult for SOC team to trust automation
1 min read
October 18

Those managing corporate security environments can have mixed feelings towards automation. On the one hand, automation helps teams efficiently handle…

Why Financial Sector Socs Must Mature to Remains Secure
4 min read
October 11

Cyber criminals have their cross hairs firmly locked on the financial sector. Although financial institutions have long been primary targets…

FS-ISAC Fall Summit 2016
2 min read
October 10

Later this month we’re attending the FS-ISAC Fall Summit, an event dedicated to sharing the best security practices and trends…

Shift To Response Requires Rethinking Security Infrastructure
1 min read
September 14

When it comes to corporate information security, it often feels like hackers have the advantage. In the September issue of (in)Secure Magazine ,…

The Benefits of Semi-Automation
5 min read
September 7

In football, planning every move down to the smallest details is everything. Any coach worth his or her salt has a…

SOCs Require More Than a Band-Aid Approach
1 min read
August 31

SOC teams are tired of being held hostage to a sea of alerts, by disconnected point solutions (each proclaiming to…

How To Propel The Next-gen Isoc – Siemplify
6 min read
August 29

The security operations center of an organization is essentially it’s eyes and ears, defining what elements should be given pass…

CRN Exclusive: Siemplify Launches First Partner Program
1 min read
August 23

Siemplify™ today announced the launch of its Nucleus Channel Partner Program, which extends the reach of the company’s ThreatNexus™ security…

Siemplify Taking Security channel by Storm
1 min read
August 23

As part of the recently announced Channel Partner Program, Siemplify’s Ryan Snell was interviewed by ChannelPartners Online.  “The biggest obstacle…

Black Hat and Beyond-Siemplify
2 min read
July 31

As industry experts continue to stress the importance of becoming the next-generation SOC, it seems everyone struggles to grasp how…

5 Reasons Why Security Operations Need More Than a SIEM
5 min read
June 13

SIEMs are mandatory tools for forensic security teams, aggregating logs from a multitude of sources, exploring within a dataset, and auditing…

Next-Gen Security Operations Center in Action -Siemplify
3 min read
May 1

Below is an eyewitness account we received from one of our U.S. bank customers following a security incident. Names and…

Morgan Stanley and the CISO Dilemma
3 min read
April 21

Last week I had the honor of speaking at the annual Morgan Stanley CTO Summit in London.  The Summit focused…

OPIsrael and the value of next generation SOCs
5 min read
April 7

Today is an excellent opportunity to see how next generation SOC platforms are changing enterprise security. One of the biggest organized cyber…

Seeing is Believing at RSA
2 min read
February 25

One of the most frequently asked questions about the Siemplify Threat Analysis Platform is how we compare to other cyber-security…

Bringing Military Intelligence to Security Operations
5 min read
February 16

Transforming the way enterprises perform cyberthreat analysis, Siemplify emerged from stealth mode today with the first security operations platform to…

The Future Of Security Operations-Siemplify
5 min read
February 16

For the past 13 years, I’ve been heavily involved in the military intelligence community and the cybersecurity industry, setting up…

LOAD MORE