Is this the year SIEM goes over the cliff?

While this may not be the year that Security Information and Event Management (SIEM) solutions fall off of the cliff of relevancy into obsolete software land, they are slowly moving closer to the edge. Initially, SIEM solutions sought to solve the collection, monitoring, analyzing, and identification of threats in the cybersecurity environment. Bogged by time intensive needs and requiring large data infrastructure to house massive amounts of information, the downward spiral of SIEM may be … More Continue reading Is this the year SIEM goes over the cliff?

The human point: Gaining visibility into the context behind user actions

In this podcast recorded at Black Hat USA 2017, Dr. Richard Ford, Chief Scientist at Forcepoint, talks about the security industry’s need of a paradigm shift toward examining user behavior and intent. Here’s a transcript of the podcast for your convenience. Hello, my name is Dr. Richard Ford, I’m the Chief Scientist over at Forcepoint. In that job, I’m responsible for a variety of different things, but one of the things I’m most excited about … More Continue reading The human point: Gaining visibility into the context behind user actions

Most damaging threat vector for companies? Malicious insiders

According to a new SANS survey, 40 percent of respondents rated malicious insiders (insiders who intentionally do harm) as the most damaging threat vector their companies faced. Furthermore, nearly half (49 percent) said they were in the process of developing a formal incident response plan with provisions to address insider threat. This further illustrates the urgency with which companies are moving to address this threat vector. “We are encouraged to see organizations recognizing malicious insiders … More Continue reading Most damaging threat vector for companies? Malicious insiders

Cybersecurity analytics and operations: Need for automation and orchestration

New research from Enterprise Strategy Group (ESG) shows that when it comes to the evolution of Cybersecurity Analytics and Operations, 71% of respondent organizations find it more difficult today than it was two years ago due to the changing threat landscape, followed by volume of alerts and increased regulatory changes. Which of the following best describes your opinion about cybersecurity analytics and operations? “Despite businesses making it a priority, there is great confusion on how … More Continue reading Cybersecurity analytics and operations: Need for automation and orchestration

Behavioural profiling: Spotting the signs of cyber attacks and misuse

Behavioural profiling is increasingly recognised as a new level of protection against cyber attacks and systems abuse, offering the potential to pick out new and unknown attacks, or to spot activities that may be missed. The basic premise is to establish a sense of how the system and its users behave, and provide a basis to protect against compromise by watching out for unwanted activities. The fundamental value of profiling is that while we may … More Continue reading Behavioural profiling: Spotting the signs of cyber attacks and misuse

Worldwide infosec spending to reach $90 billion in 2017

Enterprises are transforming their security spending strategy in 2017, moving away from prevention-only approaches to focus more on detection and response, according to Gartner. Worldwide spending on information security is expected to reach $90 billion in 2017, an increase of 7.6 percent over 2016, and to top $113 billion by 2020. Spending on enhancing detection and response capabilities is expected to be a key priority for security buyers through 2020. “The shift to detection and … More Continue reading Worldwide infosec spending to reach $90 billion in 2017

Machine learning in cybersecurity will boost big data, intelligence, and analytics spending

Cyber threats are an ever-present danger to global economies and are projected to surpass the trillion dollar mark in damages within the next year. As a result, the cybersecurity industry is investing heavily in machine learning in hopes of providing a more dynamic deterrent. ABI Research forecasts machine learning in cybersecurity will boost big data, intelligence, and analytics spending to $96 billion by 2021. “We are in the midst of an artificial intelligence security revolution,” … More Continue reading Machine learning in cybersecurity will boost big data, intelligence, and analytics spending

Can Big Data analytics strengthen your security posture?

The Ponemon Institute released the results of its first report focused on how big data analytics are being used by organizations to strengthen cybersecurity postures. Their findings are based on a survey with responses from 592 IT and IT security practitioners from US-based organizations across multiple industries. Key findings 72 percent said big data analytics played an important role in detecting advanced cyberthreats 72 percent said it is impossible to get ahead of advanced threats … More Continue reading Can Big Data analytics strengthen your security posture?

Worldwide infosec spending to reach $81.6 billion in 2016

Worldwide spending on information security products and services will reach $81.6 billion in 2016, an increase of 7.9 percent over 2015, according to the latest forecast from Gartner. Consulting and IT outsourcing are currently the largest categories of spending on information security. Until the end of 2020, the highest growth is expected to come from security testing, IT outsourcing and data loss prevention (DLP). Preventive security will continue to show strong growth, as many security … More Continue reading Worldwide infosec spending to reach $81.6 billion in 2016

How do you win the web security game when the rules keep changing?

Successfully protecting against web-based attacks is like trying to win a game that keeps changing its rules, only nobody tells you what the new rules are. With a rapidly evolving threat landscape and protected assets shifting constantly, conventional cloud security services based on static policies cannot win the web security game. Defending against today’s threat landscape is harder than ever. Zero-day attacks, exploiting newly discovered vulnerabilities for which patches and signatures are not yet available, … More Continue reading How do you win the web security game when the rules keep changing?