by Ron Samson | | Managed Security, Network Security
A cybersecurity ecosystem requires information to operate. Security teams must compile information from various sources, analyze that information to detect malicious activity, and determine the appropriate responses. The sheer volume of information in the typical...
by Ron Samson | | Managed Security, Network Security
No two organizations are the same. Optimize your security operations center model to meet your needs. The security operations center (SOC) is the heart of your organization’s cybersecurity framework. As the centralized location for threat detection, risk mitigation,...
by Ron Samson | | Network Security
The COVID-19 pandemic inspired a massive shift in “business as usual”. Before the pandemic, most organizations did not support telework programs or had a very small percentage of their employees working remotely. In the wake of COVID-19, many organizations are now...
by Ron Samson | | Network Security
The Differences Between the NOC and the SOC Network Operations Centers (NOCs) are responsible for maintaining a company’s computer system’s technical infrastructure, while Security Operations Centers (SOCs) are responsible for protecting the organization...
by Ron Samson | | Network Security
What a SOC Needs to Do An organization’s security operations center (SOC) is the core of its cybersecurity program. The SOC includes the people, processes, and tools that the company uses to detect, protect against, and remediate cyber threats to the organization....
by Ron Samson | | Network Security, Threat Insight
The Insider Threat: How To Mitigate The Top Three Human Risks To Your Company’s Information Systems. We lock our systems and networks down, we install the latest and greatest Intrusion Detection/Prevention Systems (IDS/ IPS), and we have the best physical security at...