by Ron Samson Jr | | Managed Security, Network Security
A cybersecurity ecosystem requires information to operate. Our security teams must compile information from various sources, analyze that information to detect malicious activity, and determine the appropriate responses. Given the sheer volume of information in the...
by Ron Samson Jr | | Managed Security, Network Security
No two organizations are the same. Optimize your security operations center model to meet your needs. The security operations center (SOC) is the heart of your organization’s cybersecurity framework. As the centralized location for threat detection, risk mitigation,...
by Ron Samson Jr | | Network Security
The COVID-19 pandemic inspired a massive shift in “business as usual”. Before the pandemic, most organizations did not support telework programs or had a very small percentage of their employees working remotely. In the wake of COVID-19, many organizations are now...
by Ron Samson Jr | | Network Security
The Differences Between the NOC and the SOC A Network Operations Center (NOC) and a Security Operations Center (SOC) are both teams that are tasked with ensuring that the organization’s network is functioning properly. A NOC is primarily responsible for ensuring that...
by Ron Samson Jr | | Network Security
What a SOC Needs to Do An organization’s security operations center (SOC) is the core of its cybersecurity program. The SOC includes the people, processes, and tools that the company uses to detect, protect against, and remediate cyber threats to the organization....
by Ron Samson Jr | | Network Security, Threat Insight
The Insider Threat: How To Mitigate The Top Three Human Risks To Your Company’s Information Systems. We lock our systems and networks down, we install the latest and greatest Intrusion Detection/Prevention Systems (IDS/ IPS), and we have the best physical security at...