How to Convince Your Executives and Board to Support Security Operations

Whether you have stood up an in-house security operations center (SOC), outsource your efforts to a managed security services provider, or do some of both, congratulations. Investing in security operations is a sign of improved infosec maturity, signaling you have transitioned from a prevention-only mindset to one that values the speedy detection and response to threats.


New SaltStack SecOps Products Automate Vulnerability Remediation and Continuous Security Compliance

LEHI, Utah – Nov. 19, 2019 – SaltStack, the creators of intelligent automation for IT operations and security teams, today announced the general availability of SaltStack Protect for automated discovery and remediation of security vulnerabilities across web-scale infrastructure. SaltStack Protect is a new product now available in the SaltStack SecOps family of products and is additive to SaltStack Comply.


3 Key Benefits of Automating the Grunt Work of Your Security Operations

It’s hard to believe that cars were once put together by hand, but it’s true. The early auto workers toiled with rudimentary equipment to build the first personnel vehicle to drive on four wheels. Due to the inordinate effort required to put together these lumbering beasts, only the very wealthy could afford such a luxury. That all changed with the introduction of the assembly line.


SaltStack Named InfoSec Startup of the Year and Wins Three 2019 Cyber Defense Global Awards for Innovative SecOps

LEHI, UT – November 12, 2019 – SaltStack®, the creators of intelligent automation software for security operations teams, today announced SaltStack SecOps won three 2019 Cyber Defense Global Awards, including Most Innovative Vulnerability Assessment, Remediation, and Management solution, Most Innovative Compliance solution, and Most Innovative Patch and Configuration Management solution.


Incorporating the MITRE ATT&CK Framework into Your SOAR to Deliver Faster Investigations and Improved Visibility

Everyone involved in the triage, investigation and response to security incidents battles the same adversary: Time. Whether you are a Tier 1 analyst weeding out false positives or a senior analyst dissecting a sophisticated attack, the clock is always against you.


Sitdown with a SOC Star: 11 Questions with Cameron Rayner of Crowe LLP

There are many gifted security operations professionals in the world, grinding day after day, without much fanfare. Most, of course, are not attention-seekers by nature – if they were, they likely wouldn’t have chosen the cybersecurity career path – but far too many remain in the shadows, despite having so many valuable insights and anecdotes to share about their experiences and craft. We want to change that.


5 of the Spookiest Threats Entering Your Security Operations Center

Halloween is Thursday, but if you work in a security operations center, you might feel like every day is All Hallows’ Eve considering the level of dread that can greet you at any moment. The truth is that you’re probably not seeing the real scary stuff that your adversaries have to offer – why use a flashy zero-day exploit when something far more rudimentary works just as well – but that doesn’t mean hacks, breaches and other incidents have slowed in 2019.


How to Handle Shift Handovers in the Security Operations Center

Imagine being a patient in a hospital, and when your knowledgeable caretaker leaves for the day, the incoming attendant is unfamiliar with your condition, medication needs and other specifics about your case. Aside from the obvious anxiety and feelings of abandonment you would feel, you also would run the risk of receiving error-prone or incorrect treatment. Now think about cyber threats. They can happen at any time, and once they arrive, they aren’t always easily extinguishable.


Are you dealing with the symptoms or the cause of analyst burnout?

Organizations build a SOC – a dedicated, centralized team of security experts – to effectively detect and respond to advanced threats. However, as SOCs deal with evolving threats and an expanding attack surface, advancements in the stack have not kept pace and analysts are feeling the pain.