Posts Tagged 'SIEM'
Like most things in life, successful planning for a secure network takes a pre-baked strategy. And, with that strategy comes the actions and tasks needed to carry it out. It’s much like sports – you want to enable your organization to be the one with the ball, dictating the offense to successfully execute plays that […]
Driven by the misfortune of many, Cyber Threat Intelligence exchange and consumption is becoming more proliferated, accessible and standardized. Together with legacy security technologies like Firewall, IPS and Vulnerability Assessment tools, SIEMs have used threat intelligence initially for the most common use-case of detection and – unique for SIEM – as context during attacks. However, […]
The parade of breaches, attacks and various other digital maladies hitting corporations in 2014 made it clear that default, out-of-the-box compliance and security isn’t enough to protect organizations. But the nature of advanced persistent threats (APTs), and other forms of malware, makes it difficult to find an investment that can keep the next threat from […]
We all know that 2014 has been marked by a huge uptick in high-profile data breaches in both the public and private sectors. What everyone is asking is this: How do we avoid a repeat of this situation in 2015? This is an especially important question in government. With the sensitivity of the data government […]
In 2014, companies continued to be shaken out of their contented relationship with corporate security efforts. Retailers were hacked. Millions of emails were lifted. Thousands of Social Security numbers were stolen. Gone is the era of “set it and forget it” security, where enterprises use only default security settings. This epiphany, motivated by news headlines, […]