Blog

  • Black Hat 2017 Reflections

    After a blistering week of meetings with prospects, customers and partners at Black Hat, and the barrage of follow-up work that created, I finally sat back to reflect on the Black Hat USA 2017 Conference. Here are my observations (I’m interested in your impressions, too):…

  • Stop Security “Self-Sabotage” with a Security Operations Platform

    The 2017 Verizon Data Breach Investigations Report (DBIR) is full of so much information; it’s hard sometimes to know where to start to operationalize it. I was reading a great article by Dark Reading’s Dawn Kawamoto recently entitled, “9 Ways Organizations Sabotage Their Own Security:…

  • Enterprises Tackle Today’s Cyber Threats with Security Operations Platforms

    With high alert volumes and IT staffing shortages, today’s organizations are more exposed than ever to cyber risks. These challenges, coupled with an excess of manual processes and disjointed point solutions, create a bleak outlook for companies defending against the latest attacks. To address these…

  • Vote for Syncurity in the Startup50 Big 50 Tech Startup Competition!

    We at Syncurity take pride in our ability to bring people, processes, and technology together to help our customers realize better cybersecurity outcomes and accelerate their security operations teams. We think of every Security Operations Center (SOC) as an individual business – one that must…

  • WannaCry? How Security Operations Platforms Help Get SOCs Past the Panic

    As over 100 countries worldwide reel from what is being described as one of the largest cyberattacks in history, it’s important to understand that while the attack could not have been completely prevented, its disruptive impact could have been lessened substantially if targeted enterprises were…

  • Why Cybersecurity Programs Must Begin with an Effective Process

    In our experiences here at Syncurity, we have identified two pitfalls that could prevent organizations from building a strong cybersecurity program: First, the incorrect conclusion that – if they meet compliance standards year after year by “checking every box correctly” – their systems and devices…

  • Are You Automating Incident Response Responsibly?

    Hungry for new solutions that will help secure the enterprise, security spending is up 3.7% according to Gartner. However, “interest in technologies focused solely on preventing security breaches is on the wane, in contrast to offerings that enable detection and response,” according to ZDNet. Citing…

  • GUEST BLOG: Ransomware Investigations for Impacted Healthcare Entities

    by: Jason Rebholz, Director at The Crypsis Group In July of 2016, the HHS Office for Civil Rights (“OCR”) released updated guidance[1] on how healthcare entities should respond to ransomware infections. The updated guidance introduced a presumption of a breach unless the entity can show…

  • Blue Team Analysts Assemble

    There Are Superheroes Among Us On Our Blue Teams Our superheroes are Incident Response experts who wield their knowledge skillfully. Ferreting out the villains who hide in the shadows. Fending off a steady stream of attackers who would penetrate our fortresses (aka server rooms and…