AI’s ability to handle large-scale data analysis and implement real-world recommendations makes it a potentially crucial tool for cybersecurity particularly in the context of over-stretched security teams. Read Full Article
Security information and event management (SIEM) tools offer a tried and tested way of achieving insight across even the most sprawling and complex environments. Read Full Article
In the millions of campaigns conducted by attackers in the last 12 months, phishing emails and messages have provided a way in for the vast majority. Human behavior is unpatchable, and training takes time. Read Full Article
One thing is for sure about 2024: There has been no shortage of drama in the vendor landscape for cybersecurity teams. With four significant transactions and dozens of other smaller ones, the vendor landscape will no doubt look a lot different this time next year. Read Full Article
By now, everyone knows the SIEM market is experiencing a never-before-seen consolidation, causing many security teams to re-evaluate their current SIEM products. That said, no user base is taking the brunt of this chaos more than current IBM QRadar On-premises SIEM users. Read Full Article
Having spent a significant amount of time in the SIEM industry, I’ve seen patterns and evolutions that define the landscape. One of the most notable changes has been the shift from traditional, monolithic SIEM deployments to more flexible, scalable solutions that allow organizations to adapt and grow without significant overhauls. Read Full Article
One of the challenges security teams face is managing the vast quantity of data required to identify threats effectively. While each new security control deployed brings new capabilities intended to improve security posture, it also brings with it another set of data to manage. Read Full Article
The news earlier this week about the CDK hack reveals the major flaw and prevalent issue in a vulnerable supply chain. The vulnerability of the CDK Global system turns out to have had far reaching consequences as nearly 15,000 dealerships across the continent are still struggling to operate their businesses. Read Full Article
Think of it like a seesaw. Like in a seesaw, every relationship, be it with your partner, a family member, or a friend, requires effort from both sides to keep it balanced and healthy. But what happens when one person pushes while the other is just along for the ride? Read Full Article
In 2012, I worked for one of the first vendors to deliver security-as-a-service. In those days, securing your environment from the cloud was cutting-edge, and many security teams were leery of introducing what they perceived as another point of failure into their security framework. Read Full Article
Since attackers can deploy their payloads in seconds, ensuring your security team isn’t waiting minutes or hours for their security operations platform to notice an attack is underway can mean the difference between an isolated threat and a widespread compromise. Read Full Article
“Don’t Click It, Pitch It” is a way to spread brand awareness while creating a broader movement to educate the most vulnerable members of the online community. During an initiative with the Ogden Raptors, Steve noticed that the tagline was very popular and gained a lot of positive traction. Read Full Article
As I wrote a couple of weeks ago, it is evident that the long-anticipated consolidation of security products and vendors is well underway. With significant market players Exabeam and LogRyhthm merging, Splunk now officially under the umbrella of Cisco, and Palo Alto Networks scooping up IBM QRadar SIEM Cloud business, the market momentum for consolidation is no longer a ripple but a Tsunami. Read Full Article