2017 SOC Planning: How to Bring People, Process and Technology Together

Cybersecurity professionals encounter the concept of integrating people, processes and technology frequently. The concept will appear in virtually every vendor's sales presentation as well as in[…]

Read More

Lessons Security Professionals Can Learn from "Mr. Robot"

It is not often that movies and television shows give viewers the opportunity to explore the world of hacking and digital security in a realistic manner. After two seasons, "Mr. Robot" has[…]

Read More

Use Email for Messages, Not for Incident Management

As a CISO, you know how difficult it is to recruit the best staff. Once you bring them on board, you must also work to retain them — after all, their skills are in short supply, and your[…]

Read More

Top 10 Best Practices for Cyberbreach Post-Crisis Communication

 

According to an article appearing in AT&T Cybersecurity Insights, 62 percent of all organizations surveyed admitted that they had suffered a breach in 2015. Furthermore, although 42 percent[…]

Read More

Demisto Delivers Integration with Intel Security for a Simplified Incident Response Management

We are very excited to announce our seamless integration with Intel Security today that helps SOC teams achieve a more simplified incident response management. Demisto’s Security Operations[…]

Read More

Security Automation is all the Rage at Black Hat Europe 2016

You are one step away from security automation by attending Black Hat Europe 2016 in London.

Security automation is the next big thing in the war against hacker attacks as it is the key to[…]

Read More

Important Tips for Updating Your Breach Response Plan

With so much attention given to increasingly prevalent data breaches by the media these days, you might think that every enterprise would have an effective breach response plan in place. However,[…]

Read More

Incident Response in the Age of Cloud

Most CISOs receive a rude awakening when they encounter their first major security issue in the cloud. If they identify a critical vulnerability that requires a patch, they may not have the[…]

Read More

Digital Forensics and Incident Response Community Resource

In a previous life, I was involved in the DevOps and Docker communities.

I was really impressed by the amount of quality content in those areas, and the amazing communities around that space, that[…]

Read More

How to Draft an Effective Security Incident Response Plan

When it comes to incident response and a company’s ability to manage a data breach, no organization wants to be caught off guard. The effects of an uncontrolled and poorly managed data breach can[…]

Read More