Last updated at Mon, 04 Dec 2017 21:29:38 GMT
Over the past year, Komand has grown as a company along with the cybersecurity community. One of the many ways we have been able to do so is by providing a constant stream of blog articles, where we’ve shared our experiences to help security teams be more efficient and effective.
It’s a pleasure to provide our community with ways to enhance and improve security within an organization. So much so that we look forward to all we will do in the upcoming year. But first, these blogs have proven to be our most successful blog posts thus far. Take a look and see why!
The top 7 security operations blog posts from 2016:
1. SOC Series: How to Structure and Build a Security Operations Center
So you’ve decided to set up a SOC. Now what? In this blog article, we introduce an effective framework for building and organizing the three key functions of a SOC: people, process, and technology -- in that order. Read This Blog >
2. 6 Lessons I Learned from Working in a SOC
If you’ve ever wondered what it's like to work in a SOC, our founder and CEO Jen Andre gives an in depth look at her experiences and the lessons learned while working in one. From how to investigate security events to the tedious tasks holding back security teams, Jen divulges the lessons she’s learned, which led her to pursue ways to help improve a SOC’s monitoring capabilities and tools. Read This Blog >
3. 5 Reasons Companies Are Losing Security Talent (And What to Do)
What’s harder than finding security talent? Losing the talent you already have. In this post, we provide a guide to help address five of the most common talent-retention challenges security teams face. Preventing employee burnout along with continuous education are just two of the many ways to retain your top players. Find Out the Rest >
4. What is Security Orchestration?
With the current state of cybersecurity, integrating your security team, tools, and processes in a way that streamlines incident detection, response, and remediation has become a critical and necessary task. Learn what security orchestration is (along with security automation), and how applying it to your current processes will dramatically benefit your security operations. Read This Blog >
5. A Framework for Selecting and Implementing Security Tools Today
Security products are often purchased for a variety of reasons, but those reasons don’t always always aligned with strategy. In this article, our founder Jen talks about a strategic way to select tools that fit your people and processes, as well as a framework on testing before you buy and how to implement new tools into your current security environment. See the Framework >
6. 6 Signals Your Security Processes Aren’t Working (And How To Fix Them)
Are you wasting valuable time by keeping processes that no longer operate to your advantage? Creating well-designed security processes is a challenge in both small and large teams. This post lists 6 helpful ways to address these challenges and how to make a significant difference when scaling your processes. See the 6 Signals >
7. How to Create a Culture of Security Ownership Across Your Organization
If you think security and culture don’t go together, think again. These 5 ways to cultivate a culture of security prove culture's importance in today’s digital atmosphere. Test them out by going a step further and putting our “in practice” points to practice with your team. Read This Blog >
BONUS:A Guide to Defending Pokemon Go Gyms: Lessons from Cybersecurity
This July, Pokemon Go was all the rave, and the parallels between Pokemon gym defense and cybersecurity defense were obvious to those of us at Komand: threats on the prowl, with no idea when an attacker will strike. Get a defense briefing while having fun on the Go with our guide on protecting your gyms against adversaries. Get This Guide >
Cheers to the New Year
And finally, thanks to you -- our readers -- for the success we’ve achieved thus far. We look forward to continue providing resources for you and your security team in 2017.