The Evolution of SIEM

It should be noted that SIEM platforms are exceptionally effective at what they initially were intended for: providing enterprise teams with a central repository of log information that would allow them to conduct search and investigation activities ag… Continue reading The Evolution of SIEM

Data Overload Problem: Data Normalization Strategies Are Expensive

Financial institutions spend five to ten million dollars each year managing data. A recent Computer Services Inc (CSI) study reveals that most banks expect to spend up to 40 percent of their budgets on regulatory compliance cybersecurity, often adoptin… Continue reading Data Overload Problem: Data Normalization Strategies Are Expensive

What is Predictive AI and How is it Being Used in Cybersecurity?

The predictive AI field of machine learning collects, analyzes, and tests data to predict future possibilities. AI’s neurological network is patterned on the human brain. But AI works on a scale that goes far beyond what is humanly possible. The top us… Continue reading What is Predictive AI and How is it Being Used in Cybersecurity?

Nebulous Security Visibility Needs 3 Vantage Points

Most of cybersecurity is based on having visibility of security events and providing protection ranging from preventing the action from being executed as it is being found to alerting the security team of a threat in progress. Endpoint protection, or … Continue reading Nebulous Security Visibility Needs 3 Vantage Points

Webinar Recap: The Next-Generation AI Powered SOC Platform

One thing is clear: more spend does not equal more security and the next generation of cybersecurity tools will route out these inefficiencies.
The post Webinar Recap: The Next-Generation AI Powered SOC Platform appeared first on Security Boulevard.
Continue reading Webinar Recap: The Next-Generation AI Powered SOC Platform

Why The Future of Cybersecurity Needs Both Humans and AI Working Together

A recent WhiteHat Security survey revealed that more than 70 percent of respondents cited AI-based tools as contributing to more efficiency. More than 55 percent of mundane tasks have been replaced by AI, freeing up analysts for other departmental task… Continue reading Why The Future of Cybersecurity Needs Both Humans and AI Working Together

NTA and NDR: The Missing Piece

Most SIEM vendors acknowledge the value of network traffic data for leading indicators of attacks, anomaly detection, and user behavior analysis as being far more useful than log data. Ironically, network traffic data is often expressly excluded from S… Continue reading NTA and NDR: The Missing Piece

The Problem with Relying on Log Data for Cybersecurity

One of the most prevalent issues impacting the effectiveness of security teams who use SIEM as their primary means of threat detection and remediation is the fact that data logs are an attractive medium for modern hackers to exploit.
The post The Probl… Continue reading The Problem with Relying on Log Data for Cybersecurity

Guide: The Next Generation SOC Tool Stack – The Convergence of SIEM, NDR, and NTA

Traditional security vendors offering solutions like SIEM (Security Information and Event Management) are overpromising on analytics while also requiring massive spend on basic log storage, incremental analytics, maintenance costs, and supporting resou… Continue reading Guide: The Next Generation SOC Tool Stack – The Convergence of SIEM, NDR, and NTA

Guide: The Next Generation SOC Tool Stack – The Convergence of SIEM, NDR, and NTA

Traditional security vendors offering solutions like SIEM (Security Information and Event Management) are overpromising on analytics while also requiring massive spend on basic log storage, incremental analytics, maintenance costs, and supporting resou… Continue reading Guide: The Next Generation SOC Tool Stack – The Convergence of SIEM, NDR, and NTA