4 Challenges of Stand-Alone SIEM Platforms

While SIEM is undoubtedly a step up from unmonitored network environments, the inherent nature of today’s SIEM software often falls short in several important ways. SIEM is an outdated solution for adequately protecting networks within the modern… Continue reading 4 Challenges of Stand-Alone SIEM Platforms

How the Role of the Modern Security Analyst is Changing

As organizations began to rely more heavily on networking to carry out their operations over the past decade, IT teams added security analyst positions. These professionals focused on network security and providing regulatory compliance oversight.&#160… Continue reading How the Role of the Modern Security Analyst is Changing

The Cybersecurity Processes Most Vulnerable to Human Error

The world’s reliance on fast, reliable, secure networks has likely never been as apparent as it became in early 2020, when the world responded to the Coronavirus pandemic. Suddenly, vast swaths of the global workforce needed to access and send enormous… Continue reading The Cybersecurity Processes Most Vulnerable to Human Error

How to eliminate false positives in file integrity monitoring on WordPress

File integrity monitoring (FIM) allows you to quickly detect file changes on your WordPress site. It is an important part of securing a WordPress site and the way it works is very simple: it compares baseline cryptographic hashes to the current hash of… Continue reading How to eliminate false positives in file integrity monitoring on WordPress

Automatic for the SOC People: How Automation Can Quell Those Pesky False Positives

This post first appeared in Cyber Defense Magazine’s Decembe edition.  As a newly hired cybersecurity analyst, you’re excited to start…
The post Automatic for the SOC People: How Automation Can Quell Those Pesky False Positives appea… Continue reading Automatic for the SOC People: How Automation Can Quell Those Pesky False Positives

Save Time, Increase Efficiencies and Improve Security With a Modern SIEM

SIEM solutions must evolve to keep up with the rapidly changing threat landscape, technological advancements and the growing attack surface.

The post Save Time, Increase Efficiencies and Improve Security With a Modern SIEM appeared first on Security Intelligence.

Continue reading Save Time, Increase Efficiencies and Improve Security With a Modern SIEM

Improve Your Detection Capabilities With Cyber Simulation Datasets

Every organization must develop methods of testing and improving existing detection capabilities, from on-paper assessments to a full-blown cyber simulation.

The post Improve Your Detection Capabilities With Cyber Simulation Datasets appeared first on Security Intelligence.

Continue reading Improve Your Detection Capabilities With Cyber Simulation Datasets

What’s New and Changing in the World of Vulnerability Management?

According to CIS, “Organizations that do not scan for vulnerabilities and proactively address discovered flaws face a significant likelihood of having their computer systems compromised.” While vulnerability management (VM) isn’t new,… Continue reading What’s New and Changing in the World of Vulnerability Management?

Threat Forwarding Augments Threat Intelligence with Automated Triage and Categorization

Bromium customers have long had the option to securely transmit their proprietary threat data to Bromium analysts either manually or using our one-way Cloud Connector. Now, with Bromium Secure Platform 4.1.5, we’ve improved upon Threat Forwarding, intr… Continue reading Threat Forwarding Augments Threat Intelligence with Automated Triage and Categorization

New Year, New Risks: 3 Application Security Resolutions You Should Adopt in 2019

To ring in the new year, application security teams should resolve to implement more security into the development process, prioritize consumer trust and pay more attention to false negatives.

The post New Year, New Risks: 3 Application Security Resolutions You Should Adopt in 2019 appeared first on Security Intelligence.

Continue reading New Year, New Risks: 3 Application Security Resolutions You Should Adopt in 2019