<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2659386&amp;fmt=gif">
Talk to an expert
Most Recent

Cloud Security Monitoring in the Modern SOC | SADA GroundSchool 2022

George McTaggart - VP, Marketing | August 4, 2022 | Read Time: 5 Minutes

24/7 cloud security monitoring is essential. During SADA’s Google Cloud Ground School 2022, Justin Foster shared the benefits of SOC-as-a-Service. Get the highlights.

Cloud Security Google Cloud Platform
Read Post Read Post
Google Cloud GroundSchool Modernizing Your Security Operations

All Blog Posts

Google Cloud GroundSchool Modernizing Your Security Operations
George McTaggart - VP, Marketing | August 4, 2022

Modernize Your Security Operations | SADA Ground School 2022 Recap

Cloud Security Google Cloud Platform
Read Now
Man managing computer data across multiple screens.
Cysiv Team | July 28, 2022

What Is Managed Detection and Response?

SOC-as-a-Service MDR
Read Now
Cyber internet security locks representing a possible data breach.
George McTaggart - VP, Marketing | July 22, 2022

Meeting Cyber Insurance Requirements with SOCaaS

SOC-as-a-Service Cyber Insurance
Read Now
SOC analyst working late.
Partha Panda – CEO & Co-founder | June 6, 2022

Forescout to Acquire Cysiv

SOC-as-a-Service Forescout Acquired
Read Now
An IT professional monitors a hybric cloud environment.
Cysiv Team | June 2, 2022

Security Monitoring for Hybrid Cloud Environments

Read Now
Cysiv Team | March 28, 2022

The Challenges of Detecting and Responding to Threats

SOC-as-a-Service Security Operations Center
Read Now
Mark Chatoor, Director, Product Management | March 7, 2022

Platform Updates & Recognition: A Year in Review at Cysiv

SOC-as-a-Service Security Operations Center
Read Now
A glowing lock on computer hardware
George McTaggart - VP, Marketing | February 28, 2022

How to Drive More Maturity in Your SOC with Cyber Security Automation

Read Now
Cysiv Command supports the MITRE ATT&CK framework
Justin Foster – CTO & Co-founder | February 22, 2022

Closing the Detection Gap with Cysiv’s Next-Gen SIEM & MITRE ATT&CK Dashboard

Read Now
A SOC team working together
George McTaggart - VP, Marketing | February 17, 2022

Extend Your Cybersecurity Team with a SOC-as-a-Service Model

SOC-as-a-Service Cyber Security
Read Now
AICPA SOC logo, SOC 2 certification logo, SaaS ISO 27001 logo
Angus MacDonald | February 15, 2022

The Importance of SOC 2 Type II and ISO 27001 Certification

Cloud Security Security Operations
Read Now
A man works within a cloud-native security operations center platform on a laptop.
Daniel Smith – Architect | February 4, 2022

Realizing the Benefits of a Cloud-Native Architecture for Your SOC

Cloud SOC
Read Now
SOC analysts work on desktop computer.
Cysiv Team | February 4, 2022

Beyond Basic MDR, with SOC-as-a-Service

Read Now
Cybersecurity data flowing
Cysiv Team | January 5, 2022

Security Advisory: Apache Log4j2 — Denial of Service Vulnerability

Read Now
Skyscrapers reaching into the clouds
Mark Chatoor, Director, Product Management | November 24, 2021

Choosing the Right Type of SOC Model for Your High-Growth Company

Read Now
Two people breakdown the cost of maintaining their own SOC
Cysiv Team | November 23, 2021

How Much Does It Cost to Build & Operate a 24/7 SOC?

Read Now
A group of business leaders gathered at a table in an office setting.
George McTaggart - VP, Marketing | November 9, 2021

What Is SOC-as-a-Service? Benefits & Best Practices Explained

SOC-as-a-Service Security Operations
Read Now
Rocket launching into a starry sky
Cysiv Team | September 22, 2021

How to Ensure a Cyberattack Doesn’t Derail Your High Velocity Business

Velocity Companies
Read Now
A male security analyst working on a desktop using Cysiv’s cloud-native next-gen SIEM platform for SOC-as-a-Service.
Cysiv Team | August 12, 2021

The 7 Key Elements of a SOCaaS RFP

SOC-as-a-Service Next-gen SIEM Security SOC RFP
Read Now
Close-up shot of a hacker using a keyboard.
Shivram Amritha | August 12, 2021

Ryuk Ransomware Is Evolving: Are You Ready?

Threat Detection Ryuk Ransomware
Read Now