Security Operations

The Role of Technology in the Modern SOC

Recently, Security Boulevard published an article I wrote about the role technology plays in the modern security operations center (SOC). It’s a topic near to …

The Role of Technology in the Modern SOC Read More »

Read Post
Considerations for taking the CompTIA Security+ exam

I recently took – and passed – the CompTIA Security+ exam (Sec+). Sec+ is a general introduction to multiple functional areas of security, ranging from …

Considerations for taking the CompTIA Security+ exam Read More »

Read Post
Are you dealing with the symptoms or the cause of analyst burnout?

Organizations build a SOC – a dedicated, centralized team of security experts – to effectively detect and respond to advanced threats. However, as SOCs deal …

Are you dealing with the symptoms or the cause of analyst burnout? Read More »

Read Post
Why SIEM is here to stay: Part 2

In the last installment of this blog series, my colleague Chris O’Brien discussed why enterprise log management (ELM) is here to stay. Now, I’ll tackle …

Why SIEM is here to stay: Part 2 Read More »

Read Post
Why is Today’s SOC Ineffective?

Security Operations Centers (SOCs) are the nerve centers of enterprise cybersecurity programs. They should serve a critical function by helping businesses improve their security posture …

Why is Today’s SOC Ineffective? Read More »

Read Post
It’s Time for a Better Workflow: Devo and Demisto Edition

Security Operations Centers (SOCs) are known as the “nerve center” of enterprise cybersecurity programs; others view them as “war rooms” or “situation rooms.” Regardless of …

It’s Time for a Better Workflow: Devo and Demisto Edition Read More »

Read Post
The Next-gen Cloud SIEM Must Empower Analysts

Digital transformation is creating rapidly growing volumes of data, leading to new vulnerabilities and attack vectors. At the same time, adversaries are growing increasingly more …

The Next-gen Cloud SIEM Must Empower Analysts Read More »

Read Post
How to be next-gen at Black Hat USA ‘19

The past few months have been busy for us at Devo! We’ve been on a security conference tour; the first stop was Gartner Security & …

How to be next-gen at Black Hat USA ‘19 Read More »

Read Post
EDR: The richest data in your SOC

Endpoint detection and response solutions – EDR as it’s more commonly known – act as enterprise surveillance and thus deliver a rich dataset to security …

EDR: The richest data in your SOC Read More »

Read Post
What is threat hunting? A look at past, present, and future of cyber hunting

So, you want to know what threat hunting is Threat hunting emerged as a new way to proactively identify threats in your environment. For high-performing …

What is threat hunting? A look at past, present, and future of cyber hunting Read More »

Read Post
Want a live demo or have specific questions? Speak with a Devo Specialist