Category: Industry Trends

53 results

Page Results

GDS SOC Leader Tracey Webb on Putting “the Fear of God” in Remote Workers and Leaning Into a New Normal (Video)
post

Welcome to the first episode of SOC Quarantine Diaries, a new virtual video series presented by Siemplify that examines life…

A Compare-and-Contrast Between Next-Gen SIEM and SOAR
post

(The following is a guest post written by Alissa Knight, an ethical hacker, entrepreneur and author.) The average lifespan of…

Introducing a Technical Guide to Remote Security Operations
post

The widespread coronavirus-forced lockdown is unlikely the first time security operations teams have had to temporarily migrate away from physically…

SOC 101: Building Your SOC with People, Processes and Technology (Video)
post

  Your security operations relies on people, of course, but it also fundamentally leans on processes and technology to succeed….

Security Orchestration, Automation and Response: Everything You Need to Know to Get Started
post

Security operations is a well-established discipline — many businesses have even had SecOps strategies in place for decades. Yet the…

9 Security Orchestration and Automation Benefits: How SOAR Helps Improve Incident Response
post

On average, 800 attacks per hour pummel 76 U.K. councils, according to global insurance firm Gallagher. That volume of attacks…

How Cybercriminals Are Actively Exploiting the Coronavirus/COVID-19 Crisis
post

Security researchers around the world have their work cut out for them keeping track of malicious scams and campaigns surrounding…

SOC’ing from Home? How to Migrate to Remote Security Operations in the Age of Coronavirus
post

The coronavirus pandemic is reshuffling our priorities and changing life as we know it, and with the climax of the…

Introducing the All-in-One Guide to Maturing Your MSSP
post

The managed security services market is booming. If you have recently joined this hot marketplace, congratulations, it is an exciting…

3 Unique Causes of Burnout for Security Operations Professionals
post

Burnout is a condition that transcends industries. But Amanda Berlin, CEO of Mental Health Hackers, a nonprofit whose mission is…

The Unintended SecOps Consequences of Digital Transformation
post

Between networks, endpoints, cloud technologies and critical infrastructure, digital footprints are growing for virtually every organization. This means greater efficiency…

Getting to Know Your Data With Elasticsearch (Whiteboard Video)
post

Welcome to the first installment of our revamped whiteboard series! The show-and-tell nature of these videos, plus their relatively fast-paced…

Sitdown with a SOC Star: 11 Questions with Chris Elliot of Hulu
post

When you hit the couch to binge a new TV series, the last thing you’re likely thinking about is that…

Introducing the Art of Recognizing and Surviving SOC Burnout: A Complete Manual for Security Operations Professionals [Interactive E-Book]
post

I quit my job because of burnout Burnout can hurt your heart, literally Is burnout actually a form of depression? …

The Difference Between SOAR and a Security Operations Platform
post

When an innovative product hits the market, it does not take long for the market to become overrun with similar…

The 7 Most-Read Siemplify Blog Posts Published in 2019
post

The Siemplify Blog is one of the easiest and most prolific ways we communicate with the security operations community at…

Infographic: The Past, Present and Future of the SOC
post

The security operations center, ground zero for addressing cyberthreats, has been around roughly only as long as the modern internet….

Sitdown with a SOC Star: 11 Questions with Jesse Emerson of Trustwave
post

Welcome back to our continuing Q&A series – “Sitdown with a SOC Star” – in which we pose 21 questions…

Expert Advice to Help Security Operations Centers Survive the Holidays
post

‘Tis the season for giving thanks, holiday cheer and … cyberthreats. One of those three probably isn’t on your wish…

What a Doctor’s Visit Can Teach Your SOC About Reducing MTTD and MTTR
post

Recently I took my 4-year-old daughter to the doctor’s office for a run-of-the-mill ear infection. Generally our wait time with…

3 Key Benefits of Automating the Grunt Work of Your Security Operations
post

It’s hard to believe that cars were once put together by hand, but it’s true. The early auto workers toiled…

Incorporating the MITRE ATT&CK Framework into Your SOAR to Deliver Faster Investigations and Improved Visibility
post

  Everyone involved in the triage, investigation and response to security incidents battles the same adversary: Time.  Whether you are…

5 of the Spookiest Threats Entering Your Security Operations Center
post

Halloween is Thursday, but if you work in a security operations center, you might feel like every day is All…

5 Awesome Resources to Sharpen Your Security Operations Know-How
post

Learning never takes a break. Here are five instructive, compelling and – most important of all – practical resources that…

Infographic: The Anatomy of Security Operations Pro
post

A unique genetic makeup is required to be a security operations professional. Analysts, engineers, managers act as the primary digital…

How to Prepare Your Security Operations for the Continuing IoT Upsurge
post

Cloud computing has caused headaches for businesses across the globe. But just as we begin to understand the complex nature…

How Security Operations Teams Are Winning Amid SOC Challenges (Video)
post

  Alert fatigue, skills shortages, process shortfalls and budget restrictions are all working against the security operations center (SOC), which…

The 5 Biggest Things Holding Back Security Operations Centers from Success
post

Smart, risk-minded organizations, when considering how to ensure the continuity of their business, hope for the best but prepare for…

Why Successful SOCs Detect Earlier and Respond Faster
post

  Of all the security operations center efficacy metrics, arguably none is more indicative than mean time to detect (MTTD)…

Carbon Black and Siemplify: Next-Gen AV and EDR Meets SOAR
post

  Attackers love endpoints. Protecting your endpoints from the continuous onslaught of attacks can drastically reduce the available attack surface….

Black Hat Recap: Automation is Key to Managing Threats and Scaling the Future of Security (Video)
post

  Another Black Hat USA is in the books, and anyone leaving the festivities feeling apprehensive about the state of…

What Siemplify Has in Store at Black Hat USA 2019
post

Security professionals, not grasshoppers, are just days away from descending on Las Vegas for the annual Black Hat USA conference….

4 Straightforward Things Every SOC Should be Doing to Counter Phishing
post

Tim Condello, senior customer success manager at Siemplify, contributed to this post. A recent study found that 83 percent of…

Key Takeaways from the Gartner 2019 Market Guide for SOAR
post

Last week marked another major milestone for the security orchestration, automation and response (SOAR) market: Gartner issued its first-ever Market…

5 Ways to Relieve Burnout in the Security Operations Center
post

Amid all the dismal headlines that have become routine reading for security professionals (such as this study, which referenced cybercrime…

Introducing The Road to Security Operations Maturity: A Cyentia Institute Research Report
post

If you compare two companies that are similar in all of the key ways – size, industry, revenue – what…

How SOAR Helps You Save Time When Probing Malicious Insider Threats (Video)
post

  Security operations centers deal with a variety of cases, and one of the most uncomfortable is the insider threat…

How to Harness the Benefits of Threat Hunting Despite the Security Skills Shortage (Video)
post

  Threat hunting is arguably one of the most overused and misunderstood terms in security. If you were to get…

How You Can Take Your SOAR to the Next Level
post

Security orchestration and response (SOAR) solutions are quickly becoming a must-have for security operations centers large and small. Due to…

SOARing Above the Clouds of GDPR Compliance | Siemplify
post

Security Orchestration Help Get Organizations Closer to GDPR Compliance Happy GDPR Day! You’re ready, right? Kicked back, feeling relaxed and…

Anguish and Antidote – Overcoming Top CISO Challenges | Siemplify
post

  “Here’s What’s Keeping Your CISO Up at Night” “CISO Survey Paints a Grim Picture” “Thirty-seven CISO Pain Points”

Are CISOs Ready to Trust Security Automation?
post

  For CISOs trying to keep a hold on securing the information and systems of their company, automating their security…

The Phenomenon of Phishing Attacks: How to Protect Yourself
post

Phishing attacks are nothing new and a stalwart of the hacker repertoire. The proliferation of phishing attacks both simple and…

Why is Cyber Security Important – How To Avoid Threats
post

In the ever growing battlefield of cyber security, it is nearly impossible to quantify the reasons why cyber security is…

Carbon Black and Siemplify Announce Integration Partnership
post

Carbon Black and Siemplify are excited to announce a partnership to deliver a fully integrated solution for incident response.

Petya Ransomware – How To Best Approach This Global Threat
post

The recent cyber-attack caused disruption around the globe and has infected companies in an estimated 64 countries, including major banks,…

Ransomware Attack Stuns the Globe, Security Orchestration-The Answer
post

Hospitals throughout the UK were alerted early Friday morning of a potential ransomware attack, but by the time anyone could…

New York Department of Financial Services Cyber Security Regulation
post

Security Orchestration addresses latest cybersecurity regulation plaguing financial services industry.

Top Cyber Security Threats in 2017 – Siemplify
post

With 2016 bringing political polarization into cybersecurity, we take a look into the top global cybersecurity threats in 2017 Now…

Morgan Stanley and the CISO Dilemma
post

Last week I had the honor of speaking at the annual Morgan Stanley CTO Summit in London.  The Summit focused…