SOC-as-a-Service Overview AWS Azure security

SOC-as-a-Service Overview: Improving AWS and Azure Security [Part II]

In part two of our SOC-as-Service overview, we’ll look at how a cloud-based security operations center (SOC) can improve AWS and Azure security, and why you should consider this instead of build a SOC. As we discussed in our previous post, many organizations are turning to SOC-as-a-Service to get the cloud security expertise they need without having to… Read More

People in front of computers using a SOC-as-a-service solution.

What Defines a Modern SOC-as-a-Service Solution? [Part I]

In today’s post, the first of a two-part series, we’ll discuss what defines a modern SOC-as-a-Service solution, also known as outsourced or co-managed security operations center (SOC). Whether it’s to supplement experience of in-house security teams, optimize detection and response efforts, or a combination of these, SOC-as-a-Service can provide a lot of advantages that traditional outsourced security… Read More

Ransomware and baltimore cyber attack

Lessons from the Baltimore Cyber Attack—Are You Doing Enough to Protect Your Business?

Baltimore is feeling the heat from a recent cyber attack involving ransomware that’s crippling the city’s computers. News reports say experts are debating if the strain of ransomware involved in the attack, Robbinhood, leveraged NSA hacking tool EternalBlue. While the Baltimore incident is getting the most attention, other local governments are being hit, too. Earlier this year, two… Read More

Graphic showing cyber security readiness.

[New Research] 2019 Cloud Security Report Reveals Top Challenges

The new 2019 Cloud Security Report is here, and we’re excited to share it with you. The report includes the latest cloud security trends and data points to help you benchmark how your own organization is doing. It also has insights into cloud security threats, organizational investment priorities, and solutions. Delta Risk partnered with our colleagues at… Read More

Person monitoring cyber security logs on a computer.

Managing Your Security Logs: More than Just Set and Forget

Organizations log thousands of security-related events every day from an array of devices and software.  So, what’s the best way to go about managing your security logs? The reality is, most of the time, no one looks at these logs unless they have a security incident or data breach. Some security professionals suggest that if… Read More