Posts by Jason Mical

The Role of SOC Outsourcing in a Secure Enterprise

During the past decade, security operations centers (SOC) have become an integral part of the cybersecurity programs of many organizations. When you think of a …

The Role of SOC Outsourcing in a Secure Enterprise Read More »

Read Post
Capitalize on Analyst Intuition for More Effective Cybersecurity

You’ve probably heard by now that we face a severe shortage of cybersecurity professionals with the skills and experience necessary to effectively defend against today’s—and …

Capitalize on Analyst Intuition for More Effective Cybersecurity Read More »

Read Post
How Devo Security Operations Transforms the Way SOC Analysts Work

As someone who began working in security operations centers (SOC) more than 30 years ago, back when we were known as computer incident response teams …

How Devo Security Operations Transforms the Way SOC Analysts Work Read More »

Read Post
The Role of Technology in the Modern SOC

Recently, Security Boulevard published an article I wrote about the role technology plays in the modern security operations center (SOC). It’s a topic near to …

The Role of Technology in the Modern SOC Read More »

Read Post
Are You Dealing with the Symptoms or the Cause of Analyst Burnout?

Organizations build a SOC—a dedicated, centralized team of security experts—to effectively detect and respond to advanced threats. However, as SOCs deal with evolving threats and …

Are You Dealing with the Symptoms or the Cause of Analyst Burnout? Read More »

Read Post
EDR: The richest data in your SOC

Endpoint detection and response solutions – EDR as it’s more commonly known – act as enterprise surveillance and thus deliver a rich dataset to security …

EDR: The richest data in your SOC Read More »

Read Post
What is threat hunting? A look at past, present, and future of cyber hunting

So, you want to know what threat hunting is Threat hunting emerged as a new way to proactively identify threats in your environment. For high-performing …

What is threat hunting? A look at past, present, and future of cyber hunting Read More »

Read Post
Want a live demo or have specific questions? SPEAK WITH A DEVO SPECIALIST