Why a Security Maturity Model Can Transform How You Use Analytics

With cyberattacks and breaches on the rise, security should be a major concern for all companies. In particular, enabling the development of an analytics maturity model is a useful addition to your traditional security information and event management (SIEM)-based operations. It is possible to step away from only applying the traditional SIEM model with its […]

The post Why a Security Maturity Model Can Transform How You Use Analytics appeared first on Security Intelligence.

Continue reading Why a Security Maturity Model Can Transform How You Use Analytics

Cyberthreat Intelligence Tooling — How to Quickly Locate Your Key Indicators

While there are many cyberthreat intelligence tools and platforms that can locate indicators for you, it is important to understand the process yourself before relying on a tool.

The post Cyberthreat Intelligence Tooling — How to Quickly Locate Your Key Indicators appeared first on Security Intelligence.

Continue reading Cyberthreat Intelligence Tooling — How to Quickly Locate Your Key Indicators

How to Create Value With Your (Security) Data Analytics Program

The key factor in the success of any data analytics program, security-focused or otherwise, is how efficient and business-fit the underlying data architecture is.

The post How to Create Value With Your (Security) Data Analytics Program appeared first on Security Intelligence.

Continue reading How to Create Value With Your (Security) Data Analytics Program

The Charm of Security-Driven Data Lake Architecture

To keep up with today’s threats, organizations need a way to correlate and analyze data over a longer period of time. Security-driven data lake architecture might just be the answer.

The post The Charm of Security-Driven Data Lake Architecture appeared first on Security Intelligence.

Continue reading The Charm of Security-Driven Data Lake Architecture

The Role of the Security Intelligence Analyst and the Three Main Elements of Cybersecurity

Security intelligence analysts must know the three elements of cybersecurity — threat intelligence, event intelligence and enrichment — to thwart threats.

The post The Role of the Security Intelligence Analyst and the Three Main Elements of Cybersecurity appeared first on Security Intelligence.

Continue reading The Role of the Security Intelligence Analyst and the Three Main Elements of Cybersecurity

Cheap Shock: Why Shellshock Is Still a Thing

Although security researchers discovered Shellshock more than two years ago, it remains popular among fraudsters with basic skill sets and light wallets.

The post Cheap Shock: Why Shellshock Is Still a Thing appeared first on Security Intelligence.

Continue reading Cheap Shock: Why Shellshock Is Still a Thing