Read more Cyber Moneyball: Proving Cybersecurity Return on Investment April 11, 2022 | by Christian Sorensen “How do you prove cybersecurity return on investment?” is a common question we get all the time. In the previous...
Read more Measuring SOC Performance: 5 Questions Every SOC Director Should Be Able To Answer About SOC Performance April 4, 2022 | by Jason Before you can be a great SOC director, you need an effective way to measure SOC performance against current threats....
Read more Cybersecurity Automation and Compliance Using MITRE ATT&CK: Save People, Time, and Money March 28, 2022 | by Christian Sorensen Many companies have checked all the boxes on their compliance checklists and passed their audits, but still, fail to stop...
Read more Top 5 SOC Metrics: Measure the Right Things March 21, 2022 | by Christian Sorensen Your system’s security operation center is essential to your organization’s security operations. It integrates your data with your company’s critical...
Read more Threat-Based Security Testing: A BS Detector for Your Cybersecurity Solutions March 14, 2022 | by Christian Sorensen The cybersecurity market is inundated with solutions that promise the world (or protection from it, at least). It’s difficult to...
Read more 4 Keys to an Effective Cybersecurity Training Program March 7, 2022 | by Nick Graham Cybersecurity doesn’t only refer to technology — in addition to hardware and software, you need to train your analysts on...
Read more SOC Readiness Best Practices – The Fundamentals February 28, 2022 | by Christian Sorensen Ideally, an organization’s Security Operations Center (SOC) is battle-tested and ready for anything. However, in working with some of the...
Read more Fighting Off Cybersecurity Alert Fatigue: Are Your SIEM and SOAR Optimized? February 21, 2022 | by Christian Sorensen A Security Orchestration, Automation & Response (SOAR) system is the engine of your security operations center (SOC) process. But is...
Read more Cybersecurity Principle 2: Threat Based Security 101 February 14, 2022 | by Christian Sorensen We’re all worn down by doom and gloom stories of cyber threats and compromises. The enormity of the cyber threat...