DIY SOC or SOC-as-a-Service?: A TCO Analysis by Frost & Sullivan

Leading consultancy Frost & Sullivan conducted a three-year cost comparison between building an internal SOC or buying a SOC-as-a-service

SOCaaS balances out executives hopes and fears around SaaS.

How to Deal with C-Suite and Boardroom Concerns About Cybersecurity

Executives want SaaS, but they also need security and compliance. Here’s how they can get both. 

Debunking Cybersecurity Myths: Part III—24×7 Security Monitoring IS Essential

Because hackers operate around the clock from all over the world, even as you sleep

DIY vs. SOCaaS: Frost & Sullivan Compares Features

Frost & Sullivan compared features and attributes between Arctic Wolf’s SOC-as-a-service offering, the AWN CyberSOC™ service, and what it takes for organizations to build, deploy, and maintain an in-house security operations center, the DIY approach.

A data breach isn't always the result of hackers' actions.

Healthcare Cybersecurity: New Lessons Learned in Search for Better Vaccines

Healthcare organizations have come under siege by cyberattacks. Since the recent spate of attacks has mostly affected relatively smaller organizations, the news can fly below the national radar. This article highlights some of the recent healthcare breaches

Arctic Wolf Acquires RootSecure to Deliver Risk Assessment

The acquisition allows us to expand our offerings. We also now provide comprehensive risk-based vulnerability assessment services for both networks and endpoints that improve any organization’s overall cybersecurity posture.

Arctic Wolf’s CEO Plays Nostradamus: Brian NeSmith’s Cybersecurity Predictions for 2019

So, what will 2019 bring? In a recent webinar, Arctic Wolf’s CEO Brian NeSmith offered key insights on the state of cybersecurity today and his predictions for 2019.

Cloud security should not be treated like a separate entity from on-prem security.

Why a SOC Is Crucial for Centralized Security Monitoring

Effective cyberthreat detection depends on aggregation and correlation of log data from many vital components that comprise an organization’s network.

JW Marriot logo on device

Marriott Breach Exposes 500 Million Guest Records: Preliminary Lessons

On Friday, Marriott International announced its Starwood reservation system’s database had been hacked and personal details from up to 500 million guest records were compromised.

Debunking Cybersecurity Myths: Part II—Sorry, the Cloud Won’t Save Us

We now move from age-old to brand-new in this episode and address the growing misconception around an increasing shift to cloud services.