Blog

  • Black Hat 2017 Reflections

    After a blistering week of meetings with prospects, customers and partners at Black Hat, and the barrage of follow-up work that created, I finally sat back to reflect on the Black Hat USA 2017 Conference. Here are my observations (I’m interested in your impressions, too):…

  • Stop Security “Self-Sabotage” with a Security Operations Platform

    The 2017 Verizon Data Breach Investigations Report (DBIR) is full of so much information; it’s hard sometimes to know where to start to operationalize it. I was reading a great article by Dark Reading’s Dawn Kawamoto recently entitled, “9 Ways Organizations Sabotage Their Own Security:…

  • Enterprises Tackle Today’s Cyber Threats with Security Operations Platforms

    With high alert volumes and IT staffing shortages, today’s organizations are more exposed than ever to cyber risks. These challenges, coupled with an excess of manual processes and disjointed point solutions, create a bleak outlook for companies defending against the latest attacks. To address these…

  • Vote for Syncurity in the Startup50 Big 50 Tech Startup Competition!

    We at Syncurity take pride in our ability to bring people, processes and technology together to help our customers realize better cybersecurity outcomes and accelerate their security operations teams. We think of every Security Operations Center (SOC) as an individual business – one that must…

  • WannaCry? How Security Operations Platforms Help Get SOCs Past the Panic

    As over 100 countries worldwide reel from what is being described as one of the largest cyberattacks in history, it’s important to understand that while the attack could not have been completely prevented, its disruptive impact could have been lessened substantially if targeted enterprises were…

  • Why Cybersecurity Programs Must Begin with an Effective Process

    In our experiences here at Syncurity, we have identified two pitfalls that could prevent organizations from building a strong cybersecurity program: First, the incorrect conclusion that – if they meet compliance standards year after year by “checking every box correctly” – their systems and devices…

  • Are You Automating Incident Response Responsibly?

    Hungry for new solutions that will help secure the enterprise, security spending is up 3.7% according to Gartner. However, “interest in technologies focused solely on preventing security breaches is on the wane, in contrast to offerings that enable detection and response,” according to ZDNet. Citing…

  • DOES IR HAVE A HIERARCHY OF NEEDS? (Version 2)

    Version 2.0 – Thank you to all of you that submitted suggestions and comments on our first version of this blog. Many of us had a great discussion about this during and after ArchC0n. We were hoping this would kick-start some discussion and have since…