SIEM Security Myths Debunked: SOC Hero or Zero?

Security information and event management (SIEM) is still integral to digital security. However, newer entrants to the market claim SIEM as we know it is dead. If this sounds familiar, you may remember the infamous statement in 2015 by the chief information security officer (CISO) of RSA, Eddie Schwartz, that SIEM was dead. It seems […]

The post SIEM Security Myths Debunked: SOC Hero or Zero? appeared first on Security Intelligence.

Continue reading SIEM Security Myths Debunked: SOC Hero or Zero?

SIEM Trends: What to Look for in a Security Analytics Provider

The authors of The Forrester Wave™ turn to a quote from ‘The Empire Strikes Back’ to sum up the direction of SIEM: “You truly belong here with us among the clouds.” Sticking with ‘Star Wars’ for guidance, we might also find some truth in ‘The Phantom Menace’: “You can’t stop change, any more than you […]

The post SIEM Trends: What to Look for in a Security Analytics Provider appeared first on Security Intelligence.

Continue reading SIEM Trends: What to Look for in a Security Analytics Provider

Recalibrate Insider Threat Controls When Your Employees Are Off the Corporate Network

With the rise of the remote workforce, CISOs need to shift focus from corporate networks to protect against insider threats and risks beyond the traditional perimeter. Here’s what to consider.

The post Recalibrate Insider Threat Controls When Your Employees Are Off the Corporate Network appeared first on Security Intelligence.

Continue reading Recalibrate Insider Threat Controls When Your Employees Are Off the Corporate Network

What Are Insider Threats and How Can You Mitigate Them?

There are several types of insider threats that organizations should be aware of and each presents different symptoms for security teams to diagnose.

The post What Are Insider Threats and How Can You Mitigate Them? appeared first on Security Intelligence.

Continue reading What Are Insider Threats and How Can You Mitigate Them?

What Are Advanced Persistent Threats (APTs), and How Do You Find Them?

Reading Time: 4 minutes Companies are constrained by insufficient time and resources to detect and respond to advanced persistent threats (APTs). How can SOCs fill the gaps and keep advanced attackers out of their networks?

The post What Are Advanced Persistent Threats (APTs), and How Do You Find Them? appeared first on Security Intelligence.

Continue reading What Are Advanced Persistent Threats (APTs), and How Do You Find Them?

Level Up Security Operations With Threat Intelligence Cheat Codes

Like the video game industry, security has shifted toward unified platforms, and contextual threat intelligence is the cheat code SOC teams need to defeat the bosses standing in the way of security.

The post Level Up Security Operations With Threat Intelligence Cheat Codes appeared first on Security Intelligence.

Continue reading Level Up Security Operations With Threat Intelligence Cheat Codes