FEATURED POSTS
This installment of “Sitdown” shifts from the end-user world to the vendor world, where we schmooze with Ingalls Information Security’s…
Welcome to Part 4 of our series examining how to select the best security, orchestration, automation and response (SOAR) solution…
The modern SOC is a hybrid SOC, featuring a blend of in-house and outsourced professionals. For the latter group, security…
The depressingly depleted talent pool in the information security profession is what typically draws most of the attention when personnel…
Ransomware is unlike most threats security teams face because it is virtually impossible to prevent and uses native processes, built…
Security operations professionals are constantly being forced to adapt, whether it is to the latest threat evolution, adversary techniques or…
Security operations teams that continue to rely on manual processes are squarely sitting behind the proverbial eight ball. The times…
Batman and Robin. Peanut butter and jelly. Bernie and his mittens. Some things just go better together. Security orchestration, automation…
Our next edition of “Sitdown with a SOC Star” catches up with Adva Harosh, SOC manager at First Quality, a…
Security operations teams that continue to rely on manual processes are squarely sitting behind the proverbial eight ball. The times…
Today we are happy to unveil a completely revamped SOAR marketplace that is designed from the ground up for rapid…
The turning of the annual calendar was celebrated globally in a way not seen in a generation, but 2021 will…
Well, no one saw that coming. For humanity, the global pandemic has altered every aspect of the way we interact…
Cybersecurity vendor FireEye recently disclosed a sophisticated attack which led to the “unauthorized access of their red team tools.” A…
She signs off her emails with “keep it surreal” just above a colorful signature that describes her as a “network…
In a year full of uncertainty, SOCstock 2020 delivered – and if you missed it, it’s not too late to…
(The following is a guest post written by Nick Hayes, director of content marketing and communications at Flashpoint. You can…
Our “Sitdown with a SOC Star” is back with a bang. This installment catches up with security operations and incident…
With the work-from-home shift showing little signs of letting up and new IT spending habits taking shape, organizations should prepare…
From grabbing the latest social media app to landing a vacation rental, the trend of online marketplaces is rapidly…
Amanda Fennell, CSO of Relativity, provider of e-discovery software, discusses how her security team led the company’s drive to remote…
As if organizations are not under enough pressure from ransomware purveyors, Check Point estimates that ransomware attacks have roughly doubled…
Across the world, organizations are turning to MSSPs in surging numbers to help them own or extend cybersecurity coverage and…
Rising above the daily firefighting to actually measure the effectiveness of your security operations is easier said than done. This,…
The much-awaited 2020 Gartner Market Guide for Security Orchestration, Automation and Response (SOAR) Solutions has arrived! As you can expect…
Raise your hand if you are aware that a (worsening) massive global skills shortage is afflicting the cybersecurity industry, leaving…
Audio Version Episode 6 of SOC Quarantine Diaries catches up with security industry luminary Eddie Schwartz, who is CSO of…
Security service providers require a software-driven foundation to deliver high-quality services that impress customers. But building this foundation for your…
Few things can boil the blood of a security professional quite like the unforced error. It is a common term…
Welcome to part 3 of our series examining how to select the best security, orchestration, automation and response (SOAR) solution…
Among emergency responders, including in the realm of cyber, tabletop exercises are widely accepted as a reliable training activity for…
Roughly five months into the pandemic, stark stories of unsustainability have emerged, from personal debt caused by months-long unemployment to…
Welcome to part 2 of our series on how to select the best security, orchestration, automation and response (SOAR) solution…
Money may talk for employees considering an exit from most professions, but according to new research, that doesn’t apply to…
It is impossible for the timing of Sy4 Security’s launch to be lost on Keven Knight, COO of the U.K.-based…
Security orchestration, automation and response, commonly known as SOAR, is one of the most talked about technologies in cybersecurity these…
The security operations center (SOC) is a complex place. For one, attaining efficiency is critical, considering time and effort are…
Much like the legitimate economy, the cybercriminal marketplace experiences ebbs and flows. Current factors working against it include the ripple…
With all the acronyms floating around in cybersecurity, it is easy to get confused by what means what. Security information…
Before COVID-19 arrived, Tammy Moksites was a road warrior, hand-shaker and self-professed big hugger. So while she misses how life…
A successful response to a cybersecurity crisis scenario requires having a central integration hub where incidents are managed by security…
As more and more employees have transitioned to working remotely, the cybersecurity threats that their organizations face have changed. While…
When stay-at-home orders came down for much of the world in March, few businesses were spared the consequences of trying…
Today marks a big day for Siemplify with the official launch of Siemplify Cloud – the cloud-native security operations…
As one of the biggest threats to data security, data exfiltration has the potential to result in devastating outcomes for…
Audio Version Episode 3 of SOC Quarantine Diaries catches up with veteran security mind Nick Percoco, whose renowned career…
(The following is a guest post written by Alissa Knight, an ethical hacker, entrepreneur and author.) Is your SIEM or…
IT infrastructure is more complex and interconnected than ever. For attackers, this provides a gold mine for easy attack vectors….
Automation did not enter popular lexicon until the 1940s, when Henry Ford introduced an official “automation department” at his Michigan…
Episode 2 of “SOC Quarantine Diaries” welcomes Rod Arthur, a Level III SOC engineer at business process services company…
In the context of cybersecurity, incident response refers to the tools, processes and methodologies that businesses use to respond to…
As the frequency and severity of data breaches continues to increase, and users become more concerned about privacy and the…
Welcome to the first episode of SOC Quarantine Diaries, a new virtual video series presented by Siemplify that examines life…
Every artist starts with a blank canvass. That goes for security operations teams, as well, who must illustrate their…
When forced remote work began, employees around the world were introduced to the joys of video conferencing. It has now…
Even as many SOC teams have shifted to remote operations in recent weeks, the basics of their mission are unwavering:…
(The following is a guest post written by Alissa Knight, an ethical hacker, entrepreneur and author.) The average lifespan of…
The widespread coronavirus-forced lockdown is unlikely the first time security operations teams have had to temporarily migrate away from physically…
Your security operations relies on people, of course, but it also fundamentally leans on processes and technology to succeed….
Security operations is a well-established discipline — many businesses have even had SecOps strategies in place for decades. Yet the…
On average, 800 attacks per hour pummel 76 U.K. councils, according to global insurance firm Gallagher. That volume of attacks…
Security researchers around the world have their work cut out for them keeping track of malicious scams and campaigns surrounding…
Siemplify Technical Account Manager Arnaud Loos builds on his “Open-Source SOC” whiteboard video with a deep dive into the Malware…
Today we announced the general availability of v5.5 of the Siemplify Security Operations Platform. Like all our major releases, the…
The coronavirus pandemic is reshuffling our priorities and changing life as we know it, and with the climax of the…
The managed security services market is booming. If you have recently joined this hot marketplace, congratulations, it is an exciting…
In a perfect world, every security product you brought into your environment would meet every one of your needs right…
Siemplify Technical Account Manager Arnaud Loos is back with another whiteboard, this one building on his previous discussion around…
Burnout is a condition that transcends industries. But Amanda Berlin, CEO of Mental Health Hackers, a nonprofit whose mission is…
Security operations professionals are used to staying on top of the latest computer viruses and other malware targeting the organization’s…
Between networks, endpoints, cloud technologies and critical infrastructure, digital footprints are growing for virtually every organization. This means greater efficiency…
A security operations center (SOC) is responsible for preventing any cybersecurity breaches in an organization’s network. This huge undertaking involves…
Welcome to the first installment of our revamped whiteboard series! The show-and-tell nature of these videos, plus their relatively fast-paced…
When you hit the couch to binge a new TV series, the last thing you’re likely thinking about is that…
I quit my job because of burnout Burnout can hurt your heart, literally Is burnout actually a form of depression? …
As security operations centers (SOCs) broaden their implementation of security orchestration, automation and response (SOAR) technology to automate some, or…
As if security operations professionals don’t have enough on their plates, they can add a new geo-political event — the…
When an innovative product hits the market, it does not take long for the market to become overrun with similar…
The Siemplify Blog is one of the easiest and most prolific ways we communicate with the security operations community at…
The security operations center, ground zero for addressing cyberthreats, has been around roughly only as long as the modern internet….
We are all aware that security operations centers are inundated with alerts causing massive case backlogs and potentially critical…
If you are like most security professionals, you are hoping to get a little downtime before the end…
Welcome back to our continuing Q&A series – “Sitdown with a SOC Star” – in which we pose 21 questions…
This post first appeared in Cyber Defense Magazine’s December edition. As a newly hired cybersecurity analyst, you’re excited to start…
‘Tis the season for giving thanks, holiday cheer and … cyberthreats. One of those three probably isn’t on your wish…
Recently I took my 4-year-old daughter to the doctor’s office for a run-of-the-mill ear infection. Generally our wait time with…
Whether you have stood up an in-house security operations center (SOC), outsource your efforts to a managed security services provider,…
It’s hard to believe that cars were once put together by hand, but it’s true. The early auto workers toiled…
Everyone involved in the triage, investigation and response to security incidents battles the same adversary: Time. Whether you are…
There are many gifted security operations professionals in the world, grinding day after day, without much fanfare. Most, of course,…
Halloween is Thursday, but if you work in a security operations center, you might feel like every day is All…
Imagine being a patient in a hospital, and when your knowledgeable caretaker leaves for the day, the incoming attendant is…
Learning never takes a break. Here are five instructive, compelling and – most important of all – practical resources that…
A unique genetic makeup is required to be a security operations professional. Analysts, engineers, managers act as the primary digital…
Few places inside the business demand metrics quite like the security operations center (SOC). Think about it: Not only has…
In a perfect world, security operations center (SOC) teams would always be one or two steps ahead of attackers,…
Cloud computing has caused headaches for businesses across the globe. But just as we begin to understand the complex nature…
If you follow innovation in the security space, you would be hard pressed not to have heard of SentinelOne…
Alert fatigue, skills shortages, process shortfalls and budget restrictions are all working against the security operations center (SOC), which…
Security professionals are constantly inundated with information about “breakthrough” products claiming to “change the face” of <insert product category…
Smart, risk-minded organizations, when considering how to ensure the continuity of their business, hope for the best but prepare for…
Part of the challenge security analysts face when completing investigations is ensuring they have all the data needed to…
With the introduction this year of so-called “robot umpires” into professional baseball – as part of an experiment in…
Recently leading analyst firm Gartner released its annual Magic Quadrant (MQ) for Endpoint Protection Platforms (EPP). Decision-makers look to…
Of all the security operations center efficacy metrics, arguably none is more indicative than mean time to detect (MTTD)…
Attackers love endpoints. Protecting your endpoints from the continuous onslaught of attacks can drastically reduce the available attack surface….
A common challenge security operations centers face is competing remediation and recovery actions fast. If the analyst has the authority…
Effective case management can be a real game-changer for your security operations center (SOC). Squared up against a complex…
After years of investing in best-of-breed detection and SIEM tools, security operations centers are buried in alerts, giving rise to…
Another Black Hat USA is in the books, and anyone leaving the festivities feeling apprehensive about the state of…
Security professionals, not grasshoppers, are just days away from descending on Las Vegas for the annual Black Hat USA conference….
One of the most common and time-consuming cases security operations centers (SOCs) must complete daily are malware investigations. Part…
In an ideal world, every analyst in your security operations center would have the ability to always…
Tim Condello, senior customer success manager at Siemplify, contributed to this post. A recent study found that 83 percent of…
Effective orchestration and automation can drive security teams’ productivity through the roof. From automating time-consuming, mundane manual tasks to…
Every day, more than 350,000 malicious and unwanted programs emerge, or roughly one for every person living in Honolulu….
Last week marked another major milestone for the security orchestration, automation and response (SOAR) market: Gartner issued its first-ever Market…
Amid all the dismal headlines that have become routine reading for security professionals (such as this study, which referenced cybercrime…
So you’ve been breached. Putting aside the fact that your security infrastructure failed to prevent it from happening, you…
If you compare two companies that are similar in all of the key ways – size, industry, revenue – what…
Security operations centers deal with a variety of cases, and one of the most uncomfortable is the insider threat…
Threat hunting is arguably one of the most overused and misunderstood terms in security. If you were to get…
In the treatise, “The Prince,” Niccolo Machiavelli, a 16th-century political theorist, muses about using deception to gain advantage over political…
Security orchestration and response (SOAR) solutions are quickly becoming a must-have for security operations centers large and small. Due to…
Typically when security operations teams think about security use cases, they focus on detection scenarios, thanks to the shift underway…
If you are like me, you spend at least a few minutes each day checking social media sites for…
It’s easy for businesses to overestimate the risk posed by external threats and underrate the insider threat hazard. After all,…
One thing security professionals hate is wasting time. With a continuous stream of alerts flowing into your security operations…
If it hasn’t happened to you yet, it will: Attackers have breached your defenses and are stalking your network. What…
Big day today at Siemplify! We just announced that we have raised $30 million in Series C funding. This injection…
Each year, right around the time when winter turns to spring in the United States, 64 college basketball teams stage…
The promise of machine learning in cybersecurity, specifically inside the security operations center, is vast, but let’s not get ahead…
Integrating Vulnerability Management into your SOAR to shorten investigation time Vulnerability Management has come along way in recent years. Once…
So you took the proactive step to get a budget and purchase a SOAR, congratulations. The funny thing about budgets…
Security analysts are always looking for ways to speed up the investigation process. With alerts streaming into the SOC continuously…
Seconds. That’s all it takes for an attacker to exploit a vulnerability in a security framework. Once safely inside the…
[Originally appeared on Security Boulevard] New Year resolutions in our business lives typically require more careful planning compared to our…
Enterprises Can Gain Significant Efficiencies and Increased Effectiveness through NOC/SOC Integration Approximately 80% of organizations with a security operations…
The Most Used Playbook series brings you the production playbooks noted by our professional services team as being most utilized and favored…
Machine learning holds great promise for security operations Over the past two years machine learning has found its place firmly…
An organization’s ability to discover and reduce risk in a more preventative manner rests heavily on having clear cybersecurity and…
You ask and we deliver. Siemplify version 4.25, the latest release of our award-winning security orchestration, automation and response (SOAR)…
The cybersecurity sprawl struggle is real. Quick – name 50 things that you’re really good at.
Thwarting cyber threats just takes a little security operations strategy Advice for staying ahead of cyber threats abounds, yet most…
Security automation means a more efficient SOC, improving the bottom line The evolving threat landscape just gets more complex and…
Lack of effectiveness metrics and orchestration/automation top list of security operations frustrations The more things change, the more they stay…
Effectively connect people, process and technology to minimize MTTD and MTTR There’s a reason it’s said that what gets measured…
Another year, another Black Hat has come and gone. On the show floor, we saw the continued momentum and interest…
As a Boy Scout, you’re trained to be prepared – always in a state of readiness in mind and body…
Security Orchestration Accelerates MSSP Scalability & New Service Development The market for managed security services grew 9.5% in 2017, the…
The benefits of security orchestration, automation and response (SOAR) are many – if executed correctly There’s no doubt, organizations around…
Are You Regularly Testing Your Incident Response Processes? Surely you remember it well. Your class being gathered and…
Have a clear criteria list when selecting a security orchestration vendor Security orchestration, automation and response (SOAR) vendors offer SOCs…
Automated Incident Response Addresses Key Security Operations Inefficiencies In this era where cyber threats occur rapidly and nonstop, combining incident…
Security Orchestration Help Get Organizations Closer to GDPR Compliance Happy GDPR Day! You’re ready, right? Kicked back, feeling relaxed and…
Continuously Innovating Security Orchestration and Automation The Siemplify team is always adding and improving features based on feedback from our…
Managed detection and response (MDR) is a fast-growing managed security offering focused on detecting and responding to threats that have…
“Here’s What’s Keeping Your CISO Up at Night” “CISO Survey Paints a Grim Picture” “Thirty-seven CISO Pain Points”
Much has been written about the death of the Tier 1 SOC analyst. To paraphrase Mark Twain, reports of…
Automating the triage and incident response for account misuse alerts Well, here we are. Our fourth and final installment of…
Automating the triage and incident response for DLP alerts Hey there, welcome back! We now proceed with the third…
Automating the triage and incident response for malware alerts Welcome to the second post in our four-part blog series where…
“Information is a source of learning. But unless it is organized, processed, and available to the right people in a…
Automating triage and incident response of phishing alerts Security orchestration and automation is an undeniably hot topic. Forrester named it…
To say that MSSPs have a security orchestration challenge is the understatement of the century. But not just any security…
Cybersecurity is full of terms, concepts, buzzwords, and jargon that often get misused, overstated or muddled. That’s why, every now…
Some things just go together. Peanut butter and jelly. Gin and tonic. Bacon and more bacon. The same is true…
Thousands of tools to choose from, but nearly half of security alerts go uninvestigated. Feel familiar? Hunters are fond of…
A lot has been said and written about the security talent shortage. A report by Cisco pegged the number of…
Last week marked an important milestone for the Security Orchestration and Automation market. Gartner Research issued their most comprehensive research…
When strategizing about methods of orchestration and automation, the industry often focuses on the needs of the traditional security operations…
For CISOs trying to keep a hold on securing the information and systems of their company, automating their security…
Symantec and Siemplify are excited to announce a partnership to deliver a fully integrated solution for threat management.
Building an effective security operations center (SOC) is crucial for organizations of all sizes. Just like the companies themselves, every…
NEW YORK–(BUSINESS WIRE)–Siemplify™, the leader in Security Orchestration & Automation, and Castle Ventures, a leading Data Security and Managed Security…
The Most Used Playbook Of 2017 series brings you the production playbooks noted by our professional services team as being most…
Phishing attacks are nothing new and a stalwart of the hacker repertoire. The proliferation of phishing attacks both simple and…
The landscape of Security Incident Management has altered drastically Ten years ago, the term “security incident management” was not commonplace…
The demands and challenges within the scope of security operations are quite fierce. The problems plaguing security operations: alert fatigue,…
In the ever growing battlefield of cyber security, it is nearly impossible to quantify the reasons why cyber security is…
Carbon Black and Siemplify are excited to announce a partnership to deliver a fully integrated solution for incident response.
You have to know four things before building anything, whether it’s something “simple” like assembling your new furniture from IKEA…
Before an organization can begin to analyze the benefits of security automation, a quick reminder of the threat faced by…
The recent cyber-attack caused disruption around the globe and has infected companies in an estimated 64 countries, including major banks,…
Palo Alto Networks recent 2017 Ignite Conference in Vancouver truly lived up to its namesake. The conference is a firestorm…
Hospitals throughout the UK were alerted early Friday morning of a potential ransomware attack, but by the time anyone could…
The challenges faced by a security operations center (SOC) are many and well-documented:the workload is tremendous, while the workforce is limited,…
Cybersecurity has become an increasingly challenging landscape to navigate. Having said that, there has been a constant evolution from conventional…
In early 2017, Siemplify, in partnership with Enterprise Strategy Group (ESG), conducted extensive research on the priorities and challenges within…
Half of Security Pros Ignore Some Important Alerts Short-staffed, more than half of organizations admit they ignore alerts that should…
Security Orchestration addresses latest cybersecurity regulation plaguing financial services industry.
Over the last decade, SIEM solutions have been the cornerstone of security operations. As investments in detection rose, these systems…
We are only a few months into 2017, and cybersecurity issues continue to occupy news headlines. “America has a ‘cybersecurity…
In this day and age, we are constantly playing keep up with technology. On a personal and a workplace level,…
Planning is Vital to a Successful Cyber Incident Response Program Before embarking on anything new – buying a new house,…
Cyber Defense Magazine has announced that Siemplify has won the 2017 Award for Most Cutting Edge Incident Response Solution. Siemplify…
In recognition of our accelerated growth and market demand Siemplify has been awarded the 2017 CyberSecurity Excellence Award for Fastest…
New report says “Siemplify SOC orchestration targets process quality and breadth, and analyst productivity.”
Webinar Overview Security teams are challenged by a deluge of alerts straining both infrastructure and personnel. Managing a SOC requires…
Each year the security world descends on San Francisco for RSA – a week long showcase of products, people, parties…
With 2016 bringing political polarization into cybersecurity, we take a look into the top global cybersecurity threats in 2017 Now…
Webinar: Next generation analysts for next generation threats – lessons from deploying best practices to hundreds of SOC teams! Tuesday,…
Momentum Partners, a Cybersecurity focused advisory firm based in Silicon Valley has recognized Siemplify in their “Cyber Security Watch List” in acknowledgment of…
Siemplify is a proud nominee for the 2017 Cyber Defense Magazine InfoSec Awards in the Incident Response Category. Kicking off…
It’s no secret that security operations are under fire. In most enterprises, the only thing standing between a normal…
Over the last few years, the issue of corporate cybersecurity has gone high profile and accordingly, budgets allotted to combating…
A Million Analysts Won’t Save Your SOC: The Future of Security Operations It’s no secret that companies across the world…
The modern Security Operations Center (SOC) is a highly complex system of point tools, all designed to keep sensitive corporate…
NEW RESEARCH SHOWS THAT 30 PERCENT OF ANALYSTS’ MANPOWER IS LOST TO DUPLICATE ALERTS As cyber attacks continue to expand…
Last month I attended the FS-ISAC Fall Summit and was thrilled to see the overwhelming interest in making security operations more…
This month we participated in NERC’s 2016 annual Grid Security Conference bringing together cybersecurity and physical security experts from industry and government…
It’s no secret that companies across the world face serious challenges when it comes to designing and maintaining their Security…
Those managing corporate security environments can have mixed feelings towards automation. On the one hand, automation helps teams efficiently handle…
Cyber criminals have their cross hairs firmly locked on the financial sector. Although financial institutions have long been primary targets…
Later this month we’re attending the FS-ISAC Fall Summit, an event dedicated to sharing the best security practices and trends…
When it comes to corporate information security, it often feels like hackers have the advantage. In the September issue of (in)Secure Magazine ,…
In football, planning every move down to the smallest details is everything. Any coach worth his or her salt has a…
SOC teams are tired of being held hostage to a sea of alerts, by disconnected point solutions (each proclaiming to…
The security operations center of an organization is essentially it’s eyes and ears, defining what elements should be given pass…
Siemplify™ today announced the launch of its Nucleus Channel Partner Program, which extends the reach of the company’s ThreatNexus™ security…
As part of the recently announced Channel Partner Program, Siemplify’s Ryan Snell was interviewed by ChannelPartners Online. “The biggest obstacle…
As industry experts continue to stress the importance of becoming the next-generation SOC, it seems everyone struggles to grasp how…
SIEMs are mandatory tools for forensic security teams, aggregating logs from a multitude of sources, exploring within a dataset, and auditing…
Below is an eyewitness account we received from one of our U.S. bank customers following a security incident. Names and…
Last week I had the honor of speaking at the annual Morgan Stanley CTO Summit in London. The Summit focused…
Today is an excellent opportunity to see how next generation SOC platforms are changing enterprise security. One of the biggest organized cyber…
One of the most frequently asked questions about the Siemplify Threat Analysis Platform is how we compare to other cyber-security…
Transforming the way enterprises perform cyberthreat analysis, Siemplify emerged from stealth mode today with the first security operations platform to…
For the past 13 years, I’ve been heavily involved in the military intelligence community and the cybersecurity industry, setting up…