Hadoop New Core SOC

Security teams are increasingly frustrated with legacy solutions that are not designed to address the data volumes they face today. Threat hunting and incident investigations are hindered by searches…


Why are we using logs to do the networks job?!

  Why cook eggs on a glass stove instead of using the non-stick pans in the cupboard? Sure it’ll cook the eggs, but it is not the proper tool for the job. So, why is the SOC using endpoint logs…


The Modern SOC Runs on Slack

  The modern SOC runs on Slack! I was first introduced to the concept of using modern web collaboration apps like Slack or Hipchat for Security Operations by another great security startup:…


Tribal Knowledge- Did your security expert leave with all your knowledge?

  Threat hunting isn’t only about finding compromised assets, it’s also performing the predictive function of finding the holes a malicious attacker might take advantage of. As I mentioned last…


The Rise of the Security Data Scientist

In the future of cybersecurity, there is a new role that will be critical to the security of an organization: the Security Data Scientist. The security data scientist will bring new skills to the…