Turning Down the Noise: Adding Context to the SIEM With Modern Data Security

Let’s say I tell you that my daughter crawled today. However, you don’t know if my daughter is an infant or 30 years old. If you ask, and I tell you my daughter is an infant, you still don’t know if she’s already been crawling or today marks the first time. If this is the […]

The post Turning Down the Noise: Adding Context to the SIEM With Modern Data Security appeared first on Security Intelligence.

Continue reading Turning Down the Noise: Adding Context to the SIEM With Modern Data Security

Visibility and Threat Detection in a Remote Working World

At the outset of the COVID-19 pandemic, when governments around the world put stay-at-home orders in place, it was hard to imagine the state of work would permanently change. Yet, as organizations rapidly adopted and expanded systems to enable a remote workforce — which doubled in size in just three weeks — company cultures began […]

The post Visibility and Threat Detection in a Remote Working World appeared first on Security Intelligence.

Continue reading Visibility and Threat Detection in a Remote Working World

The Journey to Simplicity: User Experience in Security

Keeping an organization secure is no easy task, especially with the explosion in cloud adoption and digital transformation against a backdrop of increasingly dangerous threats and threat actors. We can all recite the challenges that security teams struggle with — too many solutions, not enough people, not enough visibility. With the average organization deploying 25 […]

The post The Journey to Simplicity: User Experience in Security appeared first on Security Intelligence.

Continue reading The Journey to Simplicity: User Experience in Security

Customer Focus Drives Leadership in SIEM, Security Analytics

We’ve seen many changes in the SIEM and security analytics space over the last decade, but throughout that time, IBM QRadar has consistently innovated and led the market in addressing new threats.

The post Customer Focus Drives Leadership in SIEM, Security Analytics appeared first on Security Intelligence.

Continue reading Customer Focus Drives Leadership in SIEM, Security Analytics

What’s In a (Threat Intelligence) Name?

A lot of things in the threat intelligence world have multiple names, and these aliases often complicate the process of researching and dealing with security threats.

The post What’s In a (Threat Intelligence) Name? appeared first on Security Intelligence.

Continue reading What’s In a (Threat Intelligence) Name?

Become a JSON Formatter — and Kick Your Security Integrations Into Action

Becoming a JSON formatter, and packing up your data in a new way, can reduce or eliminate the need for custom work and save your security team precious time.

The post Become a JSON Formatter — and Kick Your Security Integrations Into Action appeared first on Security Intelligence.

Continue reading Become a JSON Formatter — and Kick Your Security Integrations Into Action

Understanding SIEM Technology: How to Add Value to Your Security Intelligence Implementation

As the threat landscape expands — and IT skills grow increasingly scarce — many security leaders don’t know how to get the most out of their security information and event management (SIEM) solution.

The post Understanding SIEM Technology: How to Add Value to Your Security Intelligence Implementation appeared first on Security Intelligence.

Continue reading Understanding SIEM Technology: How to Add Value to Your Security Intelligence Implementation

The Journey to Security and Cyber Resiliency

At Think 2018, attendees will learn how an integrated approach to security and resiliency can help them prevent cyberattacks and effectively respond to the ones that slip through their defenses.

The post The Journey to Security and Cyber Resiliency appeared first on Security Intelligence.

Continue reading The Journey to Security and Cyber Resiliency

Rinse, Wash, Repeat: Defining, Planning and Continuously Improving Your SIEM Strategy

For security leaders, the process of defining an SIEM strategy is never complete. A successful deployment requires careful planning, regular review and a culture of continuous improvement.

The post Rinse, Wash, Repeat: Defining, Planning and Continuously Improving Your SIEM Strategy appeared first on Security Intelligence.

Continue reading Rinse, Wash, Repeat: Defining, Planning and Continuously Improving Your SIEM Strategy

Does Your SIEM Need More Cowbell?

IBM QRadar offers all the bells and whistles — and cowbell — security teams need to enhance their SIEM capabilities without paying an arm and a leg.

The post Does Your SIEM Need More Cowbell? appeared first on Security Intelligence.

Continue reading Does Your SIEM Need More Cowbell?