Posts tagged Security Operations (SOC)

1 min Events

Takeaways From The Take Command Summit: Navigating Modern SOC Challenges

At our recent Take Command summit, experts delved into the pressing challenges faced by SOC teams.

4 min Security Operations (SOC)

Rapid7 Infuses Generative AI into the InsightPlatform to Supercharge SecOps and Augment MDR Services

At Rapid7, we are pioneering the infusion of artificial intelligence (AI) into our platform and service offerings, transforming the way security operations centers (SOCs) around the globe operate.

3 min Gartner

5 Insights from the Latest Cybersecurity Trends Research

we’ve singled out five quick insights security professionals and stakeholders should consider when looking ahead. These findings are based on Top Trends in Cybersecurity for 2024, a new research report from Gartner®.

3 min Security Operations (SOC)

Building the Best SOC Takes Strategic Thinking

So your security team is ready to scale up its security operations center, or SOC, to better meet the security needs of your organization. That’s great news. But there are some very important strategic questions that need to be answered if you want to build the most effective SOC you can and avoid some of the most common pitfalls teams of any size can encounter. The Gartner® report SOC Model Guide, is an excellent resource for understanding how to ask the right questions regarding your securit

2 min Security Operations (SOC)

Attackers are Working Around The Clock. Luckily, So Are We.

With the average cost of a breach at an all time high of $4.45 million, there’s an undeniable need for teams to enlist the right experts to quickly eradicate threats.

3 min Artificial Intelligence

Rapid7 Takes Next Step in AI Innovation with New AI-Powered Threat Detections

A decades-long transition to cloud as the de-facto delivery model of choice has delivered undeniable value to the business landscape.

3 min DFIR

Unlock Broader Detections and Forensics with Velociraptor in Rapid7 XDR

Rapid7 is excited to announce the integration of Velociraptor, our leading open-source DFIR framework, into the Insight Platform for InsightIDR Ultimate users — all with no additional deployment or configurations required.

3 min Security Operations (SOC)

Powerlifting in the Cybersecurity Skills Gap

If your SOC hasn’t been running smoothly in a while, there’s likely multiple reasons why. But that doesn’t mean there’s nothing you can do about it. An MDR provider could help you weather the talent gap.

4 min Security Operations (SOC)

Culture Fitness

Companies all over the world tout their positive cultures and how great it is to be part of the team. But what a shrewd potential hire should really be looking for is a culture with true depth, not just a social media presence.

3 min Security Operations (SOC)

How to Foster Talent in a Cybersecurity Skills Gap

It’s more about thoughtfully building a talent pipeline that benefits your specific organization and moves the needle for the company. The key word in that last sentence? Thoughtfully.

3 min Security Operations (SOC)

The Intelligent Listing: Cybersecurity Job Descriptions That Deliver

Modern job descriptions cause a lot of eye-rolling. What used to be a couple of paragraphs is now filled with a laundry list of too many "requirements."

4 min Managed Detection and Response (MDR)

The Empty SOC Shop: Where Has All the Talent Gone?

Here's a closer look at some strategies you can use to address churn and staffing shortages in your security operations center (SOC).

2 min Security Operations (SOC)

Cybersecurity Analysts: Job Stress Is Bad, but Boredom Is Kryptonite

Repetitive tasks are a big part of a cybersecurity analyst’s day. But combining monotony with the need for attentiveness can be kryptonite.

2 min Detection and Response

The Future of the SOC Is XDR

Extended detection and response (XDR) is increasingly gaining traction across the industry.

2 min Detection and Response

Gimme! Gimme! Gimme! (More Data): What Security Pros Are Saying

Eight in 10 organizations collect, process, and analyze security operations data from more than 10 sources, but security analysts need even more.