Posts tagged Security Operations (SOC)

Cybersecurity Analysts: Job Stress Is Bad, but Boredom Is Kryptonite

Security Operations

Cybersecurity Analysts: Job Stress Is Bad, but Boredom Is Kryptonite

Amy Hunt's avatar

Amy Hunt

The Future of the SOC Is XDR

Security Operations

The Future of the SOC Is XDR

Dina Durutlic's avatar

Dina Durutlic

Gimme! Gimme! Gimme! (More Data): What Security Pros Are Saying

Security Operations

Gimme! Gimme! Gimme! (More Data): What Security Pros Are Saying

Dina Durutlic's avatar

Dina Durutlic

Today’s SOC Strategies Will Soon Be Inadequate

Security Operations

Today’s SOC Strategies Will Soon Be Inadequate

Dina Durutlic's avatar

Dina Durutlic

Are You in the 2.5% Who Meet This Cybersecurity Job Requirement?

Security Operations

Are You in the 2.5% Who Meet This Cybersecurity Job Requirement?

Amy Hunt's avatar

Amy Hunt

MDR, MEDR, SOCaaS: Which Is Right for You?

Security Operations

MDR, MEDR, SOCaaS: Which Is Right for You?

Aaron Wells's avatar

Aaron Wells

This CISO Isn’t Real, But His Problems Sure Are

Security Operations

This CISO Isn’t Real, But His Problems Sure Are

Amy Hunt's avatar

Amy Hunt

The Great Resignation: 4 Ways Cybersecurity Can Win

Security Operations

The Great Resignation: 4 Ways Cybersecurity Can Win

Amy Hunt's avatar

Amy Hunt

Is it the End of the Cybersecurity Skills Gap Crisis Yet?

Security Operations

Is it the End of the Cybersecurity Skills Gap Crisis Yet?

Amy Hunt's avatar

Amy Hunt

The Cybersecurity Skills Gap Is Widening: New Study

Security Operations

The Cybersecurity Skills Gap Is Widening: New Study

Jesse Mack's avatar

Jesse Mack

Accelerating SecOps and Emergent Threat Response with the Insight Platform

Security Operations

Accelerating SecOps and Emergent Threat Response with the Insight Platform

Lee Weiner's avatar

Lee Weiner

Talkin’ SMAC: Alert Labeling and Why It Matters

Products and Tools

Talkin’ SMAC: Alert Labeling and Why It Matters

matthew berninger's avatar

matthew berninger

2021 Detection and Response Planning, Part 3: Why 2021 Is the Year for SOC Automation

Products and Tools

2021 Detection and Response Planning, Part 3: Why 2021 Is the Year for SOC Automation

Margaret Wei's avatar

Margaret Wei

2021 Detection and Response Planning, Part 2: Driving SOC Efficiency With a Detections-First Approach to SIEM

Products and Tools

2021 Detection and Response Planning, Part 2: Driving SOC Efficiency With a Detections-First Approach to SIEM

Meaghan Buchanan's avatar

Meaghan Buchanan

Moving Toward a Better Signature Metric in SOCs: Detection Efficacy

Products and Tools

Moving Toward a Better Signature Metric in SOCs: Detection Efficacy

matthew berninger's avatar

matthew berninger

Intro to the SOC Visibility Triad

Detection and Response

Intro to the SOC Visibility Triad

Meaghan Buchanan's avatar

Meaghan Buchanan

Building a Culture of Security Awareness: How to Use Performance Metrics to Communicate SOC Effectiveness Throughout Your Org

Products and Tools

Building a Culture of Security Awareness: How to Use Performance Metrics to Communicate SOC Effectiveness Throughout Your Org

Meaghan Buchanan's avatar

Meaghan Buchanan

How to Develop a Common Language for Security Buy-In Across Your Business

Security Operations

How to Develop a Common Language for Security Buy-In Across Your Business

Wade Woolwine's avatar

Wade Woolwine

A Day in the Life of a Rapid7 SOC Analyst

Security Operations

A Day in the Life of a Rapid7 SOC Analyst

Jonathan Beggs's avatar

Jonathan Beggs

Rapid7 Leads All 'Strong Performers' in 2018 Forrester Wave for Emerging MSSPs

Products and Tools

Rapid7 Leads All 'Strong Performers' in 2018 Forrester Wave for Emerging MSSPs

Jake Godgart's avatar

Jake Godgart

How to Set Up Your Security Operations Center (SOC) for Success

Security Operations

How to Set Up Your Security Operations Center (SOC) for Success

Wade Woolwine's avatar

Wade Woolwine