Category: SOC Best Practices

122 results

Page Results

Why People Still Dominate Modern Security Operations (And How Detection and Response Technology Can Help)

Of all the cybersecurity disciplines, one is uniquely and intrinsically connected to the human being: security operations. The success of…

Part 2: Your Security Operations Cheat Sheet for Cloud Logs (And How to Tie Them to the MITRE ATT&CK Framework)

Cloud adoption is growing at astonishing rates, and more than 90 percent of organizations are now operating a multi-cloud strategy….

How to Map SOC Analyst Skills With Experience Level

[Chris Crowley is a cybersecurity instructor and industry analyst. This is Part 3 of his series of easy-to-use “best practice”…

Log4Shell Vulnerability: What Security Operations Teams Need to Know Now and How SOAR Can Help You Detect and Respond

For security professionals, 2021 will conclude with them racing to respond to one of the most grave internet vulnerabilities in…

Your Security Operations Cheat Sheet for Windows and Linux Logs (And How to Tie Them to the MITRE ATT&CK Framework)

Within the security operations center, visibility is everything. Being aware of the details of users, assets, known threats, and specific…

Sitdown With a SOC Star: 11 Questions With Sentara Healthcare’s John DePalma

John DePalma, winner of the 2021 Security Engineer of the Year Award at the inaugural SOCstock Awards, joined the hot…