security operations
Do cybersecurity certifications still deliver? Experts share 6 key insights
Cybersecurity certifications continue to open doors and shape careers in security operations (SecOps). However, the mileage that individuals and organizations get out of certs can vary by industry, the specific demands of ...
Not a SOC FAQ! This is SOC FMD!
Somebody asked me this profound question that (a) I feel needs an answer and that (b) I’ve never answered in the past:If you run a SOC (or an equivalent D&R team), what things ...
Cybersecurity’s workforce woes are a myth: 5 ways to rethink recruiting
The threat landscape is more challenging than ever, and the cybersecurity workforce is dogged by overwork and burnout. No wonder there's a cybersecurity talent shortage. Or is there? ...
5 SecOps automation challenges — and how to overcome them
A confluence of factors is driving the need for greater automation of security operations centers (SOCs). Primary among them are the growing sophistication of threats, the sheer volume of security-related data, the ...
9 SecOps talks you don’t want to miss at Black Hat
Hacker Summer Camp (a.k.a. Black Hat USA 2024) is almost here, and it's going to be jam-packed once again with intriguing cybersecurity talks. With over 100 sessions to choose from over the ...
Top cybersecurity Substacks to follow
On Substack, publications run by cybersecurity professionals and journalists with expertise in cybersecurity can help practitioners keep pace with developments in security operations and many other areas of cybersecurity ...
We Love What’s Broken … Yes, This Of Course Means SIEM!
We Love What’s Broken … Yes, This Of Course Means SIEM!SIEM challenges never stopped me from loving this technology, but I am very cognizant of YMMV. Anyhow, CardinalOps released their annual “state of SIEM” ...
Listen up: 10 cybersecurity podcasts you can learn from
Regardless of where you are in your career in cybersecurity – whether you have been a trusted expert for decades or are just starting out – it can be difficult to keep ...
9 best practices for leveraging threat intelligence in your security operations
Cyberthreat intelligence (CTI) can be a powerful weapon for protecting an organization from cyberattack, enabling teams to understand both the threats they face and the tactics, techniques, and procedures of their adversaries ...
Security operations by the numbers: 30 cybersecurity stats that matter
Enterprise IT and security operations (SecOps) leaders are under growing pressure from threat actors pounding away at their infrastructure defenses using a variety of new and proven tactics, techniques and procedures ...