The Dirty Little SECRET OF SIEM: Fighting Today’s Overwhelming Digital Threats with Analog Tools

 

Today’s cyber criminals are creating malware at a dizzying pace. It’s no longer humanly possible to keep up. AI is the only answer.

Read the full article

Jan 30, 2019

Where Should SIEM Go in 2019?

 

Read the full article

Dec 24, 2018

Do you really want to pay extra for all that data?

Big data is not only getting big, it’s also getting very expensive. Most SIEM vendors charge customers by the volume of data they handle. This means not only that companies usually end up spending more on protecting their networks than they originally planned, but also that...

Read the full article

Dec 05, 2018

Why should all the cool security analysts focus on deciphering attack intent?

"Intent." Is there anything more essential to business decision-making and processes?

Read the full article

Nov 20, 2018

Bringing Security Architecture Into the Light – the Inherent Value of Transparency and Diagnostics

The huge challenge presented by today’s attack campaigns – multi-stage attacks, with thousands of constantly evolving attack vectors – have led organizations to buy hundreds of security products in order to defend their networks.  As exciting new technologies arise – advanced...

Read the full article

Oct 31, 2018

Today’s Lesson: Thanks to AI, Network Security and User Privacy Can Co-Exist in Higher Ed

The EDUCAUSE Annual Conference is underway in Denver, and it has already fulfilled its promise to gather academic professionals and technology providers from around the world to discuss the hottest IT issues in higher ed. Cyber security is emerging as a strong conference...

Read the full article

Oct 31, 2018

The Sad Story of SIEM Can Still Have a Happy End

For those of you wondering what I brought back from RSA – other than more tote bags than I know what to do with – I actually returned with a strong idea of what was most, and least, interesting there. And the single trend that dominated them all.

Read the full article

Sep 24, 2018

Creating Your Own Threat Hunting Army

Cyber intelligence is one of the strongest tools that can be used to combat a potential attacker. Accessing the information needed to build cyber intelligence from a reliable source is typically difficult and very expensive – but it doesn’t have to be. You can create your own...

Read the full article

Sep 11, 2018

The Bigger Upside: Thoughts on the NY State Cybersecurity Requirements for Financial Services Companies

On March 1st, new cyber-security regulations (23 NYCRR 500) for Financial Services companies went into effect in New York State. The regulations enforce certain minimum cyber-security standards for financial services companies, following the growing cyber threats that...

Read the full article

Sep 11, 2018

Ransomware Wake-up Call – What You Need to Know

“Ransomware” – it’s been screaming from headlines around the globe in the last 24 hours – almost a hundred nations attacked, the British health system paralyzed, likely billions in damages, and an already weary world had its sense of security shaken, yet again.

Read the full article

Sep 11, 2018
No More Posts