Home > Support > Blog
Why the Security Operations Center Is Back, and How to Make It Work

Why the Security Operations Center Is Back, and How to Make It Work

A few years ago, the security operations center (SOC) was on the decline. The dedicated security team and facility that you might see in a TV or movie drama were largely phased out in favor of distributed teams and outsourcing. However, the emergence of both targeted external attacks and insider threats have made the SOC a virtual necessity.

Thursday, December 22, 2016/Author: Paul Truitt, CISO & VP, Cybersecurity/Number of views (1876)/Comments (0)/
Categories: Security Services
SIEMonster: A Complete SIEM Solution That’s Free and Open Source

SIEMonster: A Complete SIEM Solution That’s Free and Open Source

As IT infrastructures have become more sophisticated and complex, so have the cyberattacks that attempt to infiltrate them. Advanced persistent threats (APTs) are capable of sneaking past defenses and operating undetected for weeks or even months. There are often signs that an attack is taking place, but organizations lack effective tools for monitoring threats and correlating security event information, and in many cases just ignore the signs as false positives.

Monday, December 19, 2016/Author: Paul Truitt, CISO & VP, Cybersecurity/Number of views (6522)/Comments (0)/
Categories: Security Services
Creating an Incident Response Plan that Works

Creating an Incident Response Plan that Works

In a previous post, we discussed how security analytics integrates multiple data streams and pulls log information into a centralized system. This enables you to correlate security events from system logs and security tools, analyze the data in context, and compare it with threat intelligence.

Friday, October 21, 2016/Author: Paul Truitt, CISO & VP, Cybersecurity/Number of views (1467)/Comments (0)/
RSS