SOCwise Series: Practical Considerations on SUNBURST
This blog is part of our SOCwise series where we’ll be digging into all things related to SecOps from a practitioner’s point of view, helping us enable defenders to both build context and confidence in what they do. Although there’s been a lot of chatter about supply chain attacks, we’re going to ...
Time to Get Proactive About Threat Hunting
When I think about the many challenges that threat hunters face nowadays, trust me when I say that I feel their pain. Early in my career, I was a Security Engineer in a SOC who scrambled into action upon receiving the proverbial midnight call about an incident. The system I was part of wasn’t ...
Join the Cyber Security Dance
Automation and orchestration are central to the proverbial cyber security dance between IT operations and security operations center (SOC). Both functions need to work with each other and establish a rhythm and alignment to keep their organization protected from cyber threats. The lure to automate is driven by the desire ...
MPOWER 2017 Highlights: A Cybersecurity Conference On-Demand
This blog was written by Allison Cerra, McAfee’s former CMO. Conference organizers waited with anticipation. In a sleek, high-tech conference hall glowing with McAfee’s deep signature red, a colossal scoreboard flashed the results of a real-time vote for who would take the stage and speak next. The results were a ...
Time to Close vs. Root Cause – Are we measuring the wrong thing (again)?
This blog was written by Barbara Kay. “Human beings adjust behavior based on the metrics they’re held against. Anything you measure will impel a person to optimize his score on that metric. What you measure is what you’ll get. Period.” – Dan Ariely, Duke University behavioral economist in Harvard Business Review ...