SOC

Blog
6 Tips for Building an Effective SOC
A presentation from RSA Unplugged 2019 offers several tips to security leaders seeking to build or improve...
Read More
Blog
7 Threat Hunting Benchmarks from a Survey of Security Pros
Threat hunting aims to find threats that didn’t trigger an alert, yet it’s still a new concept for...
Read More
Blog
How is the Relationship between DevOps and Cybersecurity?
The relationship between cybersecurity and DevOps is more important than ever, yet just 34% of security...
Read More
Blog
7 Simple but Effective Threat Hunting Tips from a Veteran Threat Hunter
Threat hunting is the process of looking for malicious activities that have evaded existing detection...
Read More
Blog
Network Security: Why it’s Harder for Threats to Hide Behavior
If signatures in cybersecurity are like fingerprints in a criminal investigation, behavioral detection...
Read More
Blog
How Many Daily Cybersecurity Alerts does the SOC Really Receive?
The security operations center (SOC) is drowning in cybersecurity alerts. According to an analyst report by...
Read More
Blog
How Many Security Tools Does the SOC Have?
Studies show the security operations center (SOC) may have anywhere from 10 to 100 cybersecurity tools....
Read More
Blog
Threat Hunting is Growing Up in the SOC, Study Finds
A new survey of cybersecurity professionals finds the process of threat hunting is maturing in the security...
Read More
Blog
5 Useful Benchmarks on Threat Hunting for the Security Operations Center
Threat hunting is one of the hottest trends in cybersecurity because threats are slipping past defenses...
Read More