Default and Favorite Activeboards
Table of Contents:
00:00 - Introduction
00:09 - Default Activeboard
00:27 - Set as default
01:06 - Unset as default
01:16 - Favorite Activeboards
01:34 - Filter favorites
02:08 - Remove favorites
Table of Contents:
00:00 - Introduction
00:09 - Default Activeboard
00:27 - Set as default
01:06 - Unset as default
01:16 - Favorite Activeboards
01:34 - Filter favorites
02:08 - Remove favorites
Table of Contents:
00:00 - Introduction
00:07 - Concept of Time Range Lookup
00:34 - Example of Time Range Lookup
01:32 - Creating a Time Range Lookup
02:20 - Using a Time Range Lookup
Table of Contents:
00:00 - Introduction
00:21 - Pretty-Print View: Concept
00:46 - Pretty-Print View: Visualization
01:22 - Pretty-Print-View: Extraction
Today we published the 2020 Devo SOC Performance ReportTM. The subtitle, A Tale of Two SOCs, underscores that there are two types of security operation centers (SOC): those that are performing reasonably well and those that are struggling. As someone who has worked in cybersecurity for more than 20 years, I find the results of our second annual SOC report informative, instructive, and also extremely irritating.
Threat hunting is one of the most critical activities performed by SOC teams. Once an alert triggers and a tier-1 analyst assesses it and sends it up the line for further evaluation by a more senior analyst, the race is on. Hunting down the threat as quickly as possible, before it can wreak havoc on the organization, becomes the top priority.
As if the pandemic itself weren’t causing enough pain and suffering in the world, cybercriminals are busy developing and deploying COVID-19-related malware to try and take advantage of unsuspecting victims. Fortunately, one of the world’s leading technology companies, Microsoft, is taking action to help people avoid becoming victims of these scams.
During the past decade, security operations centers (SOC) have become an integral part of the cybersecurity programs of many organizations. When you think of a defined team spending all of its time managing security events and using consistent processes for remediation, you may envision a group of company employees who report to a CIO or CISO.
With most of the country sheltering in place and so many people working remotely, work-life balance is taking on a new meaning and cloud infrastructure is taking a beating. The dramatic increase in daily activity and network use is creating both a visibility challenge and an operating model shift for already lean security teams.