Request a Demo
Welcome to the Cygilant Blog

Three Ways Indicators of Compromise Help SOC Teams

Posted by Kevin Landt on Mar 1, 2018

Threat Intelligence plays a major role in the modern Security Operations Center (SOC). This threat data can help analysts to detect security incidents earlier, take more informed actions, and implement security controls to defend against known threats.

Threat Intelligence includes context about threat actors, their intentions and their methods. It also includes Indicators of Compromise (IOC’s), which include IP addresses, domain names, URLs, file hashes, and more, that are known to be malicious. If one of these blacklisted items shows up in your event logs, it’s a good indicator that your network has been compromised.

Cybersecurity in 2016: Work Together Or Die Alone

Posted by Shawn O'Brien on Mar 31, 2016


Recently EiQ wrote about executive teams' perspective on cybersecurity and how organizations should collaborate, both internally and externally, to defend against cyber attacks. There is a serious need for companies to increase collaboration on cybersecurity and share critical information about vulnerabilities in order to prevent future hacks.

New Year’s Resolutions: A 2016 Security Checklist

Posted by Shawn O'Brien on Jan 13, 2016


The start of a new year provides an opportunity for organizations to review their operations—and strengthen digital security wherever it is lacking. Evidence suggests more hacking scandals will occur in 2016, and since no business wants to be the next headline-making hack victim, strong cyber defenses are a must. Here is a checklist of three cybersecurity tools IT teams should have in order to protect their computer assets this year.

How SOC-as-a-Service Benefits Midmarket and Small Enterprise Organizations

Posted by Kevin Landt on Dec 11, 2015


Due to a growing complexity in information security, midmarket and small enterprise organizations need to find a readily available solution that can help them protect their data. One such option is a security operations center (SOC)-as-a-service, proposed by the Enterprise Strategy Group (ESG) whitepaper, "SOC-as-a-service for Midmarket and Small Enterprise Organizations."


SANs In Your SOCs

Posted by Security Steve on Apr 17, 2015

Ironically, whether you are an IT professional or not, security, cyber risk and data breaches have hit the mainstream.  Recent headlines show that “Data security breaches have only gotten larger, more frequent and more costly. The average total cost of a data breach to a company increased 15 percent this year from last year, to $3.5 million per breach, from $3.1 million.”
Rather than becoming another statistic, companies are taking action and learning how to cut the possibility of risk down significantly with the right controls in place.  There are plenty of control sets on the market today. Security controls are safeguards and counteract or minimize security risks relating to digital property. They focus on technical aspects of information security with the primary goal of helping organizations prioritize and automate their efforts to defend against the most common and damaging insider and outsider attacks.

Northeast Blizzard: What You Need to Know to Stay Safe

Posted by Security Steve on Feb 2, 2015

The business capital of the world braced for a blizzard last week — and everything froze. Two feet of snow was expected in New York City (the actual totals were a lot lower), where Mayor Bill de Blasio banned non-essential vehicles from the road – including the city's arguably essential food delivery cars, trucks and bicycles.

SOC Expectations

Posted by Security Steve on Jan 19, 2015

2014 was a banner year for data breaches.  It really did seem as though every day a new story hit the press regarding another data breach.  And company size and sector didn’t matter.  All organizations were vulnerable to external attack, and the consequences were certainly derailing companies and their leaders' careers.  Clearly, current methods have become ineffective for proactive awareness and timely remediation of security vulnerabilities.  Simply installing traditional security products and meeting compliance checklists are not enough.

Outsourcing Your SOC

Posted by Security Steve on Jul 28, 2014

It should be common knowledge that the security of your company data is one of the most critical functions of an Information Technology program. It’s also one of the most budget- and resource-intensive functions, as well. With all of the directions you can get pulled in every day, having to deal with the headache of your security posture shouldn’t be at the top of your list. That’s where outsourcing your information security comes in. Data security outsourcing, specifically security monitoring, can be a viable and intelligent option when it comes to keeping the data in your organization secure, and it allows you to keep security levels high without having to allocate precious resources to those functions. 

Can Your SOC Answer These Questions?

Posted by Kevin Landt on Jun 23, 2014

recent article from Dark Reading highlights an ongoing shift in focus towards incident detection & response:

SOC Made Simple

Posted by Security Steve on Jun 16, 2014

No, this isn’t a blog about footwear, but too often when security professionals hear the acronym SOC, they realize they know more about the socks they wear than the center of their security operations. If you are completely comfortable with your SOC then you can skip today’s blog, but if you are still in the dark, SOC stands for Security Operations Center and you should read on to learn what is a security operations center, how do they work, and why do should you care?

Subscribe to Email Updates

Experience how Cygilant SOCVue and 24x7 GSOC Team can help detect threats, prioritize vulnerabilities and apply patches.

Request a Demo

Most Popular Posts

Posts by Topic

See All