Blog Posts Tagged with "SIEM"
What Is Next Generation SIEM? 8 Things to Look For
November 14, 2019 Added by:Avi Chesla
Effective next generation SIEM should provide better protection and equally important, if not more, a much more effective, next gen user experience.
Comments (0)
Five Main Differences between SIEM and UEBA
October 23, 2019 Added by:Nilesh Dherange
Five ways in which SIEM and UEBA technology differs.
Comments (0)
Eight Steps to Migrate Your SIEM
July 22, 2019 Added by:Trevor Daughney
The migration of a legacy SIEM entails changes to a wide array of people, process and technology within an organization.
Comments (0)
SOAR: Doing More with Less
April 26, 2019 Added by:Michele Zambelli
Implementing an SOAR model can provide the glue to make this security intelligence actionable using repeatable processes for faster incident response that does not require adding more resources.
Comments (0)
Buy, Rent, or Uber Your Security Operations Center
November 05, 2018 Added by:A. N. Ananth
What better way to provide continuous monitoring and analysis than through a security operations center (SOC)? But a SOC is complex and expensive.
Comments (0)
Today's Threat Landscape Demands User Monitoring
February 27, 2018 Added by:Eric Sun
For a complete picture of user behavior, you need visibility both on and off the corporate network.
Comments (0)
Plugging the Gaps in Your Incident Response
April 13, 2017 Added by:Avishai Wool
Professor Avishai Wool, CTO and Co-Founder of AlgoSec, explains how two gaps may be holding back your incident response strategy – and how to fill them.
Comments (0)
When You Are Overwhelmed With Alerts, it is Time to Automate.
January 07, 2015 Added by:Michael Leland
Your security team is getting alerts from internal sensors, threat intelligence from multiple sources, and potential indicators of attack or compromise from your SIEM. Relying on these human filters to decode, deduce, and decide what is relevant takes valuable time and can result in long delays between attack, detection, and containment.
Comments (2)
Transforming SIEM - Gain Actionable Intelligence for Securing Information Assets (Webcast)
July 23, 2013 Added by:InfosecIsland News
In this webcast, our guest, John Kindervag, Principal Analyst, Security and Risk Management at Forrester Research, will describe a data security and control framework for collecting and analyzing new types of IT data to transform SIEM into a security and IT analytics tool.
Comments (0)
The Search for Infosec Minds
November 01, 2012 Added by:Ian Tibble
Since the early 2000s, I have commented in different forms on the state of play, with a large degree of cynicism, which was greeted with cold reservation, smirks, grunts, and various other types of un-voiced displeasure, up to around 2009 or so. But since at least 2010, how things have changed...
Comments (0)
Real World Information Security
September 05, 2012 Added by:Tripwire Inc
Alex uncovered a poorly designed web page and convinced it to give up its secrets. What followed was a quick RDP war trying to plant our backdoor. I found myself with root level access having blasted away at it using Metasploit and uncovered several Easter eggs instructors had planted...
Comments (0)
Is Packet Capture Critical? Heck Yes...
September 04, 2012 Added by:Richard Stiennon
Beaconing detection is a feature in the fastest growing security solutions in the market. I am tracking most of these vendors at 100% annual growth rates, a sure sign of a trend. Intelligent packet capture is a must-have technology in every cyber defense armament...
Comments (1)
Detecting Unknown Application Vulnerabilities "In Flight"
July 10, 2012 Added by:Rafal Los
While you certainly can use velocity and frequency to detect attacks against a web application, high frequency doesn't always mean an attack or that a vulnerability is present. But, it is a fallacy to assume that a component needs to have a high frequency or velocity to signal targeting by an attacker....
Comments (0)
Logging: Opening Pandora's Box - Part 3 - Paralysis
May 17, 2012 Added by:Rafal Los
Paralysis can come from over-dependence on analysis. You've heard the term "analysis paralysis" where someone spends so much time trying to make the perfect decision while factors change that ultimately no decision is made before the deadline passes or some event happens...
Comments (0)
Logging: Opening Pandora's Box - Part 2 - Elation
May 10, 2012 Added by:Rafal Los
Once you get over the anxiety of logging, a wave of elation generally hits. Whether you're getting excited about being able to catch evil-doers in the act, or the capability to notice system failures before they happen logging can save your skin more than you'd think...
Comments (0)
Logging: Opening Pandora's Box - Part 1 - Anxiety
May 09, 2012 Added by:Rafal Los
You're probably worried that log analysis is going to consume all of your time, or you'll find out that your organization has been pwn3d for years and all your data has been exfiltrated in real-time and your latest database is being copied off to China... aren't you?
Comments (0)
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids
- COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider
- SecurityWeek Extends ICS Cyber Security Conference Call for Presentations to August 31, 2020