<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2659386&amp;fmt=gif">
Most Recent

Why We Built Our Own SIEM Platform | Cysiv SOC-as-a-Service

Justin Foster – CTO & Co-founder | January 8, 2021 | Read Time: 3 Minutes

By developing our own SIEM platform, Cysiv is able to deliver better, stronger services to our clients compared to those using an off-the-shelf solution. Learn why.

siem platform
Read Post Read Post
Cysiv's next-gen SIEM platform

All Blog Posts

Cysiv's next-gen SIEM platform
Justin Foster – CTO & Co-founder | January 8, 2021

Why We Built Our Own SIEM Platform

siem platform
Read Now
Computer code on a dark abstract background.
Cysiv Team | December 22, 2020

Security Advisory: SolarWinds Supply Chain Attack

Read Now
Abstract cloud background with data.
Cysiv Team | December 15, 2020

Security Advisory: Cisco AnyConnect Security Mobility Client

Read Now
A male security analyst working on a desktop using Cysiv’s cloud-native next-gen SIEM platform for SOC-as-a-Service.
Cysiv Team | December 11, 2020

7 Tips for Preparing a SOC-as-a-Service RFP

SOC-as-a-Service Next-gen SIEM Security
Read Now
A group of business leaders gathered at a table in an office setting.
George McTaggart - VP, Marketing | December 3, 2020

The Business Case for SOC-as-a-Service

SOC-as-a-Service Security Operations
Read Now
A group of security analysts work at a  SOC-as-a-Service provider.
George McTaggart - VP, Marketing | December 2, 2020

How MSSPs Can Stay Competitive by Offering Modern MDR and Managed SIEM

SOC-as-a-Service Managed Security Next-gen SIEM MSSP
Read Now
A mesh of lines with data points representing cybersecurity data.
Toby Ryan | October 30, 2020

The Detection Value of Cybersecurity Data

Data Science Threat Detection
Read Now
Data points on a globe represent the Internet of Things.
Cysiv Team | October 27, 2020

Cybersecurity Awareness Month 2020: 4 Trends in IoT Security

IoT Security IoT Security Solutions
Read Now
Justin Foster – CTO & Co-founder | October 1, 2020

Taking the co-managed approach to SOC to the next level with Custom Rules

SOC-as-a-Service
Read Now
Two office workers walking and holding tablets.
George McTaggart - VP, Marketing | September 30, 2020

Customer Profile: Knak Chooses Cysiv SOC-as-a-Service

SOC-as-a-Service Case Study
Read Now
 Cybersecurity code and data abstract image.
Cysiv Team | August 27, 2020

The Art & Science of Threat Hunting: Q&A with Corey Milligan - Part 2

Cybersecurity Threat Hunting
Read Now
 A male threat hunter works at a desktop.
Cysiv Team | August 21, 2020

The Art & Science of Threat Hunting: Q&A with Corey Milligan - Part 1

Cybersecurity Threat Hunting
Read Now
A woman analyzes security events at her office work station.
George McTaggart - VP, Marketing | August 5, 2020

Five Reasons Every Healthcare Organization Needs a 24/7 Security Operations Center

Security Operations Healthcare
Read Now
A screen showing lines of data.
Angus MacDonald | June 9, 2020

The Importance of SOC 2 Type II and ISO 27001 Certification

Cloud Security Security Operations
Read Now
A man works within a cloud-native security operations center platform on a laptop.
Daniel Smith – Architect | June 4, 2020

Why a Cloud-Native Architecture Is Essential for a Modern SOC Platform

Read Now
An illustrated image showing connections between different types of technology, locations, and people.
Partha Panda – CEO & Co-founder | May 22, 2020

Responding to the Security Challenges of a Distributed Workforce

Read Now
Justin Foster – CTO & Co-founder | May 5, 2020

When a Security Operations Center is No Longer a “Place”

Security Operations Covid-19
Read Now
A group of security analysts gathers in front of their monitors to address a threat.
Mark Chatoor, Director, Product Management | May 1, 2020

What to Look for in a SOC-as-a-Service Provider

SOC-as-a-Service
Read Now
A man holds a video conference call with his colleagues.
Basiru Ndow & Ahmed Khater | April 29, 2020

Tips for Addressing Zoom Meeting Security Issues

Threat Research
Read Now
Justin Foster – CTO & Co-founder | April 22, 2020

Why Threat Detection Requires a Multi-Technique Approach

Threat Detection
Read Now