Category: Security Orchestration and Automation

121 results

Page Results

How Automation Can Help You Respond to Hacked Credentials Circulating the Dark Web
post

Much like the legitimate economy, the cybercriminal marketplace experiences ebbs and flows. Current factors working against it include the ripple…

What Is SIEM? What Is SOAR? How Do They Compare? Do You Need Both?
post

With all the acronyms floating around in cybersecurity, it is easy to get confused by what means what. Security information…

How to Take Command During a Security Crisis (+Video)
post

A successful response to a cybersecurity crisis scenario requires having a central integration hub where incidents are managed by security…

8 Best Practices for Secure Remote Work Access
post

As more and more employees have transitioned to working remotely, the cybersecurity threats that their organizations face have changed. While…

How SOAR Can Take Your Security Budget Further in Turbulent Times
post

When stay-at-home orders came down for much of the world in March, few businesses were spared the consequences of trying…

We’ve SOARed and SOARed, and Now We’ve Reached the Cloud
post

  Today marks a big day for Siemplify with the official launch of Siemplify Cloud – the cloud-native security operations…

Looks Can Be Deceiving: Context and the New Normative in Log and Event Analysis
post

(The following is a guest post written by Alissa Knight, an ethical hacker, entrepreneur and author.) Is your SIEM or…

What is Vulnerability Management?
post

IT infrastructure is more complex and interconnected than ever. For attackers, this provides a gold mine for easy attack vectors….

How Security Teams Are Automating, According to a New SANS Survey
post

Automation did not enter popular lexicon until the 1940s, when Henry Ford introduced an official “automation department” at his Michigan…

What is Incident Response? A 5-Step Plan to Resolve Security Events
post

In the context of cybersecurity, incident response refers to the tools, processes and methodologies that businesses use to respond to…

What is SIEM? The Roadmap to a Better SOC
post

As the frequency and severity of data breaches continues to increase, and users become more concerned about privacy and the…

3 Emerging Remote Security Use Cases Addressable with SOAR Playbooks
post

Even as many SOC teams have shifted to remote operations in recent weeks, the basics of their mission are unwavering:…

A Compare-and-Contrast Between Next-Gen SIEM and SOAR
post

(The following is a guest post written by Alissa Knight, an ethical hacker, entrepreneur and author.) The average lifespan of…

Introducing a Technical Guide to Remote Security Operations
post

The widespread coronavirus-forced lockdown is unlikely the first time security operations teams have had to temporarily migrate away from physically…

SOC 101: Building Your SOC with People, Processes and Technology (Video)
post

  Your security operations relies on people, of course, but it also fundamentally leans on processes and technology to succeed….

Security Orchestration, Automation and Response: Everything You Need to Know to Get Started
post

Security operations is a well-established discipline — many businesses have even had SecOps strategies in place for decades. Yet the…

9 Security Orchestration and Automation Benefits: How SOAR Helps Improve Incident Response
post

On average, 800 attacks per hour pummel 76 U.K. councils, according to global insurance firm Gallagher. That volume of attacks…

An Insider’s Look at MISP for Open-Source Threat Intelligence (Video)
post

Siemplify Technical Account Manager Arnaud Loos builds on his “Open-Source SOC” whiteboard video with a deep dive into the Malware…

SOC’ing from Home? How to Migrate to Remote Security Operations in the Age of Coronavirus
post

The coronavirus pandemic is reshuffling our priorities and changing life as we know it, and with the climax of the…

Introducing the All-in-One Guide to Maturing Your MSSP
post

The managed security services market is booming. If you have recently joined this hot marketplace, congratulations, it is an exciting…

The Open-Source SOC (Whiteboard Video)
post

  Siemplify Technical Account Manager Arnaud Loos is back with another whiteboard, this one building on his previous discussion around…

How Security Orchestration Supercharges Your SOC
post

A security operations center (SOC) is responsible for preventing any cybersecurity breaches in an organization’s network. This huge undertaking involves…

Sitdown with a SOC Star: 11 Questions with Chris Elliot of Hulu
post

When you hit the couch to binge a new TV series, the last thing you’re likely thinking about is that…

Introducing the Art of Recognizing and Surviving SOC Burnout: A Complete Manual for Security Operations Professionals [Interactive E-Book]
post

I quit my job because of burnout Burnout can hurt your heart, literally Is burnout actually a form of depression? …

Why Playbook Lifecycle Management is the New Feature Your SOAR Technology Needs
post

As security operations centers (SOCs) broaden their implementation of security orchestration, automation and response (SOAR) technology to automate some, or…

Iranian Retaliatory Cyber Threats Are a Reminder of the Importance of Sound Incident Response
post

As if security operations professionals don’t have enough on their plates, they can add a new geo-political event — the…

The Difference Between SOAR and a Security Operations Platform
post

When an innovative product hits the market, it does not take long for the market to become overrun with similar…

Infographic: The Past, Present and Future of the SOC
post

The security operations center, ground zero for addressing cyberthreats, has been around roughly only as long as the modern internet….

A New Approach to Managing the Lifecycle of Your Security Operations Playbooks (Video)
post

  We are all aware that security operations centers are inundated with alerts causing massive case backlogs and potentially critical…

Product Update: What’s New in v5.3 of the Siemplify Security Operations Platform
post

    If you are like most security professionals, you are hoping to get a little downtime before the end…

Sitdown with a SOC Star: 11 Questions with Jesse Emerson of Trustwave
post

Welcome back to our continuing Q&A series – “Sitdown with a SOC Star” – in which we pose 21 questions…

Automatic for the SOC People: How Automation Can Quell Those Pesky False Positives
post

This post first appeared in Cyber Defense Magazine’s December edition.  As a newly hired cybersecurity analyst, you’re excited to start…

What a Doctor’s Visit Can Teach Your SOC About Reducing MTTD and MTTR
post

Recently I took my 4-year-old daughter to the doctor’s office for a run-of-the-mill ear infection. Generally our wait time with…

Incorporating the MITRE ATT&CK Framework into Your SOAR to Deliver Faster Investigations and Improved Visibility
post

  Everyone involved in the triage, investigation and response to security incidents battles the same adversary: Time.  Whether you are…

5 of the Spookiest Threats Entering Your Security Operations Center
post

Halloween is Thursday, but if you work in a security operations center, you might feel like every day is All…

How to Handle Shift Handovers in the Security Operations Center
post

Imagine being a patient in a hospital, and when your knowledgeable caretaker leaves for the day, the incoming attendant is…

5 Awesome Resources to Sharpen Your Security Operations Know-How
post

Learning never takes a break. Here are five instructive, compelling and – most important of all – practical resources that…

Introducing the No-Nonsense Guide to Security Operations Metrics
post

Few places inside the business demand metrics quite like the security operations center (SOC). Think about it: Not only has…

Uncovering Hidden Threats with Endgame and the Siemplify Security Operations Platform
post

  In a perfect world, security operations center (SOC) teams would always be one or two steps ahead of attackers,…

Extending the Value of Your SentinelOne Deployment with Siemplify
post

  If you follow innovation in the security space, you would be hard pressed not to have heard of SentinelOne…

How Security Operations Teams Are Winning Amid SOC Challenges (Video)
post

  Alert fatigue, skills shortages, process shortfalls and budget restrictions are all working against the security operations center (SOC), which…

Product Update: What’s New in Version 5.1 of the Siemplify Security Operations Platform
post

  Security professionals are constantly inundated with information about “breakthrough” products claiming to “change the face” of <insert product category…

The 5 Biggest Things Holding Back Security Operations Centers from Success
post

Smart, risk-minded organizations, when considering how to ensure the continuity of their business, hope for the best but prepare for…

SOC Automation 101: How to Use SOAR to Overcome Time-Consuming Tasks and Address Alerts (Video)
post

  With the introduction this year of so-called “robot umpires” into professional baseball – as part of an experiment in…

CrowdStrike & Siemplify: Integrating Endpoint Protection and SOAR
post

  Recently leading analyst firm Gartner released its annual Magic Quadrant (MQ) for Endpoint Protection Platforms (EPP). Decision-makers look to…

Why Successful SOCs Detect Earlier and Respond Faster
post

  Of all the security operations center efficacy metrics, arguably none is more indicative than mean time to detect (MTTD)…

Powerful Case Management in the SOC: 4 Things You Need to Know
post

  Effective case management can be a real game-changer for your security operations center (SOC). Squared up against a complex…

The Difference Between Alert-Centric vs. Threat-Centric SOAR (Video)
post

After years of investing in best-of-breed detection and SIEM tools, security operations centers are buried in alerts, giving rise to…

Black Hat Recap: Automation is Key to Managing Threats and Scaling the Future of Security (Video)
post

  Another Black Hat USA is in the books, and anyone leaving the festivities feeling apprehensive about the state of…

What Siemplify Has in Store at Black Hat USA 2019
post

Security professionals, not grasshoppers, are just days away from descending on Las Vegas for the annual Black Hat USA conference….

Siemplify and Intezer: Incorporate Genetic Malware Analysis into Your SOAR Platform (Video)
post

  One of the most common and time-consuming cases security operations centers (SOCs) must complete daily are malware investigations. Part…

How Playbooks Can Drive Consistent and Repeatable Investigations in the SOC (Video)
post

      In an ideal world, every analyst in your security operations center would have the ability to always…

All the Ways to Combine Symantec and Siemplify to Drive Security Operations (Video)
post

  Effective orchestration and automation can drive security teams’ productivity through the roof.  From automating time-consuming, mundane manual tasks to…

How to Get the Most out of Malware Investigations With SOAR (Video)
post

  Every day, more than 350,000 malicious and unwanted programs emerge, or roughly one for every person living in Honolulu….

Key Takeaways from the Gartner 2019 Market Guide for SOAR
post

Last week marked another major milestone for the security orchestration, automation and response (SOAR) market: Gartner issued its first-ever Market…

5 Ways to Relieve Burnout in the Security Operations Center
post

Amid all the dismal headlines that have become routine reading for security professionals (such as this study, which referenced cybercrime…

How to Manage a Companywide Security Crisis from the SOC (Video)
post

  So you’ve been breached. Putting aside the fact that your security infrastructure failed to prevent it from happening, you…

How SOAR Helps You Save Time When Probing Malicious Insider Threats (Video)
post

  Security operations centers deal with a variety of cases, and one of the most uncomfortable is the insider threat…

How to Harness the Benefits of Threat Hunting Despite the Security Skills Shortage (Video)
post

  Threat hunting is arguably one of the most overused and misunderstood terms in security. If you were to get…

Using Deception and Automation to Reduce Attacker Dwell Time
post

In the treatise, “The Prince,” Niccolo Machiavelli, a 16th-century political theorist, muses about using deception to gain advantage over political…

How You Can Take Your SOAR to the Next Level
post

Security orchestration and response (SOAR) solutions are quickly becoming a must-have for security operations centers large and small. Due to…

Why Your Cybersecurity Use Cases Should Span the Lifecycle of a Threat
post

Typically when security operations teams think about security use cases, they focus on detection scenarios, thanks to the shift underway…

How Alert Grouping Can Help You Deal with Security Stack Complexity (Video)
post

  If you are like me, you spend at least a few minutes each day checking social media sites for…

How the “Diamond Model” Can Help SOC Analysts Boost Incident Response
post

If it hasn’t happened to you yet, it will: Attackers have breached your defenses and are stalking your network. What…

That’s a Nice SOAR Budget You Have There… Pity if Something Were to Happen to It
post

So you took the proactive step to get a budget and purchase a SOAR, congratulations. The funny thing about budgets…

Siemplify and the Palo Alto Application Framework Making case investigation and response fast
post

Seconds. That’s all it takes for an attacker to exploit a vulnerability in a security framework. Once safely inside the…

4 Things SOC Managers Should CARE About in 2019
post

[Originally appeared on Security Boulevard] New Year resolutions in our business lives typically require more careful planning compared to our…

Why Enterprises Should Consider NOC/SOC integration
post

Enterprises Can Gain Significant Efficiencies and Increased Effectiveness through NOC/SOC Integration   Approximately 80% of organizations with a security operations…

Most Used Playbooks – Incident Response, Alert & Automation
post

The Most Used Playbook series brings you the production playbooks noted by our professional services team as being most utilized and favored…

What Machine Learning Means for Security Operations
post

Machine learning holds great promise for security operations Over the past two years machine learning has found its place firmly…

How to Get More from Your Existing Security Technologies
post

The cybersecurity sprawl struggle is real. Quick – name 50 things that you’re really good at.

Security Operations Strategies for Winning the Cyberwar
post

Thwarting cyber threats just takes a little security operations strategy Advice for staying ahead of cyber threats abounds, yet most…

Security Automation Saves Money, Time and Work
post

Security automation means a more efficient SOC, improving the bottom line The evolving threat landscape just gets more complex and…

Security Operations Challenges Impeding SOC-cess – 2018 SANS Survey
post

Lack of effectiveness metrics and orchestration/automation top list of security operations frustrations The more things change, the more they stay…

Do I Need a SIEM if I Have SOAR?
post

Another year, another Black Hat has come and gone. On the show floor, we saw the continued momentum and interest…

5 SOAR Implementation Pitfalls to Avoid
post

The benefits of security orchestration, automation and response (SOAR) are many – if executed correctly There’s no doubt, organizations around…

Selecting a Security Orchestration Vendor
post

Have a clear criteria list when selecting a security orchestration vendor Security orchestration, automation and response (SOAR) vendors offer SOCs…

Security Orchestration for the Cloud
post

Continuously Innovating Security Orchestration and Automation The Siemplify team is always adding and improving features based on feedback from our…

The Role of Security Orchestration in Managed Detection | Siemplify
post

Managed detection and response (MDR) is a fast-growing managed security offering focused on detecting and responding to threats that have…

Should You Stop Hiring Tier 1 SOC Analysts?
post

  Much has been written about the death of the Tier 1 SOC analyst. To paraphrase Mark Twain, reports of…

Security Automation for Account Misuse | Siemplify
post

Automating the triage and incident response for account misuse alerts Well, here we are. Our fourth and final installment of…

Automate This: Security Automation for DLP Alerts | Siemplify
post

Automating the triage and incident response for DLP alerts   Hey there, welcome back! We now proceed with the third…

Security Automation for Malware Alerts
post

Automating the triage and incident response for malware alerts Welcome to the second post in our four-part blog series where…

What SOC Managers Should Know about SOAR and Threat Intel | Siemplify
post

“Information is a source of learning. But unless it is organized, processed, and available to the right people in a…

Security Automation for Phishing Alerts | Siemplify
post

Automating triage and incident response of phishing alerts Security orchestration and automation is an undeniably hot topic. Forrester named it…

BACK TO BASICS: What is security automation? | Siemplify
post

Cybersecurity is full of terms, concepts, buzzwords, and jargon that often get misused, overstated or muddled. That’s why, every now…

Back to Basics: What is Security Orchestration?
post

Some things just go together. Peanut butter and jelly. Gin and tonic. Bacon and more bacon. The same is true…

Are Cybersecurity Tools Enough? | Siemplify
post

Thousands of tools to choose from, but nearly half of security alerts go uninvestigated. Feel familiar? Hunters are fond of…

SOARing above the Security Talent Shortage
post

A lot has been said and written about the security talent shortage. A report by Cisco pegged the number of…

Gartner releases SOAR Innovation Insight research | Siemplify
post

Last week marked an important milestone for the Security Orchestration and Automation market. Gartner Research issued their most comprehensive research…

Symantec and Siemplify Team Up
post

Symantec and Siemplify are excited to announce a partnership to deliver a fully integrated solution for threat management.    

Understanding the SOC Team Roles And Responsibilities
post

Building an effective security operations center (SOC) is crucial for organizations of all sizes. Just like the companies themselves, every…

Castle Ventures announced of ThreatNexus – to drive Security Orchestration
post

NEW YORK–(BUSINESS WIRE)–Siemplify™, the leader in Security Orchestration & Automation, and Castle Ventures, a leading Data Security and Managed Security…

4 Best Practices For Building a Security Operations Center
post

You have to know four things before building anything, whether it’s something “simple” like assembling your new furniture from IKEA…

The Next Stage Of Security Automation – How Will It Evolve
post

Before an organization can begin to analyze the benefits of security automation, a quick reminder of the threat faced by…

Security Orchestration Made Simple: Effective Implementation Processes
post

The challenges faced by a security operations center (SOC) are many and well-documented:the workload is tremendous, while the workforce is limited,…

Darkreading interviews Siemplify CEO Amos Stern on ESG Research
post

Half of Security Pros Ignore Some Important Alerts Short-staffed, more than half of organizations admit they ignore alerts that should…

From SIEM to Security Orchestration
post

Over the last decade, SIEM solutions have been the cornerstone of security operations.  As investments in detection rose, these systems…

Security Operations Challenges and Priorities for 2017
post

We are only a few months into 2017, and cybersecurity issues continue to occupy news headlines. “America has a ‘cybersecurity…

3 Essential Things To Include In Your Cyber Security Strategy
post

In this day and age, we are constantly playing keep up with technology. On a personal and a workplace level,…

451 Research features Siemplify’s security orchestration platform
post

New report says “Siemplify SOC orchestration targets process quality and breadth, and analyst productivity.”

Webinar-Next Generation Analyst for Next Generation Threats
post

Webinar Overview Security teams are challenged by a deluge of alerts straining both infrastructure and personnel. Managing a SOC requires…

How Leading Organizations Leveraging Security Orchestration
post

Webinar: Next generation analysts for next generation threats – lessons from deploying best practices to hundreds of SOC teams! Tuesday,…

APPLYING SECURITY ORCHESTRATION AND AUTOMATION FOR BETTER ROI
post

  It’s no secret that security operations are under fire. In most enterprises, the only thing standing between a normal…

InfoSecurity Magazine Webinar: The future of Security Operation
post

A Million Analysts Won’t Save Your SOC: The Future of Security Operations It’s no secret that companies across the world…

Duplicate Alerts Drain Your Security Analyst’s Time
post

NEW RESEARCH SHOWS THAT 30 PERCENT OF ANALYSTS’ MANPOWER IS LOST TO DUPLICATE ALERTS As cyber attacks continue to expand…

Putting Threat Intelligence to Work
post

Last month I attended the FS-ISAC Fall Summit and was thrilled to see the overwhelming interest in making security operations more…

A Million Security Analyst Won’t Save Your SOC
post

It’s no secret that companies across the world face serious challenges when it comes to designing and maintaining their Security…

Why it’s so difficult for SOC team to trust automation
post

Those managing corporate security environments can have mixed feelings towards automation. On the one hand, automation helps teams efficiently handle…

Why Financial Sector Socs Must Mature to Remains Secure
post

Cyber criminals have their cross hairs firmly locked on the financial sector. Although financial institutions have long been primary targets…

SOCs Require More Than a Band-Aid Approach
post

SOC teams are tired of being held hostage to a sea of alerts, by disconnected point solutions (each proclaiming to…

How To Propel The Next-gen Isoc – Siemplify
post

The security operations center of an organization is essentially it’s eyes and ears, defining what elements should be given pass…

5 Reasons Why Security Operations Need More Than a SIEM
post

SIEMs are mandatory tools for forensic security teams, aggregating logs from a multitude of sources, exploring within a dataset, and auditing…

Next-Gen Security Operations Center in Action -Siemplify
post

Below is an eyewitness account we received from one of our U.S. bank customers following a security incident. Names and…

OPIsrael and the value of next generation SOCs
post

Today is an excellent opportunity to see how next generation SOC platforms are changing enterprise security. One of the biggest organized cyber…

Bringing Military Intelligence to Security Operations
post

Transforming the way enterprises perform cyberthreat analysis, Siemplify emerged from stealth mode today with the first security operations platform to…

The Future Of Security Operations-Siemplify
post

For the past 13 years, I’ve been heavily involved in the military intelligence community and the cybersecurity industry, setting up…