6 Steps Every New CISO Should Take to Set Their Organization Up for Success

Starting a new job in the CISO role can feel overwhelming. But the time for security to be seen as a key player — and to have a major business impact — has never been better.

The post 6 Steps Every New CISO Should Take to Set Their Organization Up for Success appeared first on Security Intelligence.

Continue reading 6 Steps Every New CISO Should Take to Set Their Organization Up for Success

Humio raises $9M Series A for its real-time log analysis service

Humio, a startup that provides a real-time log analysis service for on-premises and cloud infrastructures, today announced that it has raised a $9 million Series A round led by Accel. It previously raised its seed round from WestHill and Trifork. The company, which has offices in San Francisco, the U.K. and Denmark, tells me that […] Continue reading Humio raises $9M Series A for its real-time log analysis service

Cloud Security With a Chance of Data Breaches

Companies should look for a cloud security solution that sits in front of the database and can send traffic to your existing tools without having to install any software on the database.

The post Cloud Security With a Chance of Data Breaches appeared first on Security Intelligence.

Continue reading Cloud Security With a Chance of Data Breaches

5 More Retail Cybersecurity Practices to Keep Your Data Safe Beyond the Holidays

These five retail cybersecurity tips will help organizations mitigate cyberattacks and provide customers with the safest shopping experience during the holiday season.

The post 5 More Retail Cybersecurity Practices to Keep Your Data Safe Beyond the Holidays appeared first on Security Intelligence.

Continue reading 5 More Retail Cybersecurity Practices to Keep Your Data Safe Beyond the Holidays

Tripwire Products: Quick Reference Guide

Here at The State of Security, we cover everything from breaking stories about new cyberthreats to step-by-step guides on passing your next compliance audit. But today, we’d like to offer a straight-forward roundup of the Tripwire product suite. … Continue reading Tripwire Products: Quick Reference Guide

Rooted in Security Basics: The Four Pillars of Cyber Hygiene

The term “cyber hygiene” pops up frequently in articles, blogs and discussions about cybersecurity. But what does it really mean? Some say it is an ill-defined set of practices for individuals to follow (or ignore). Others say it is a measu… Continue reading Rooted in Security Basics: The Four Pillars of Cyber Hygiene

Why User Behavior Analytics Is an Application, Not a Cybersecurity Platform

User behavior analytics (UBA) is a good application, but it isn’t a replacement for SIEM. UBA is more accurately described as a cybersecurity application that can be added on top of an SIEM tool.

The post Why User Behavior Analytics Is an Application, Not a Cybersecurity Platform appeared first on Security Intelligence.

Continue reading Why User Behavior Analytics Is an Application, Not a Cybersecurity Platform

Log Management for Government Agencies: What You Need to Know

Without a doubt, log management should be part of the core of any IT security platform of a government agency. It has a role in not only security but also in operations and compliance requirements. Logging can provide situational awareness of things ha… Continue reading Log Management for Government Agencies: What You Need to Know

What Is Passive Asset Discovery, and Is It That Important?

Let’s first talk about asset discovery in general and why it is useful, even critical, to most organisations. What Is Asset Discovery? Asset discovery is the ability to provide visibility of all devices located within an organisation with limited… Continue reading What Is Passive Asset Discovery, and Is It That Important?

[SANS ISC] Are Your Hunting Rules Still Working?

I published the following diary on isc.sans.org: “Are Your Hunting Rules Still Working?“: You are working in an organization which implemented good security practices: log events are collected then indexed by a nice powerful tool. The next step is usually to enrich this (huge) amount of data with external sources. You

[The post [SANS ISC] Are Your Hunting Rules Still Working? has been first published on /dev/random]

Continue reading [SANS ISC] Are Your Hunting Rules Still Working?