Cloud Native Tools Series Part 3: Get the Right Tools

As we near the end of our journey into cloud native tools, let’s take a look at visibility. In a previous post, I discussed how business entities need to understand their end of the Amazon Web Services (AWS) shared security model to uphold their cloud defense duties. This knowledge can help them safeguard their digital […]

The post Cloud Native Tools Series Part 3: Get the Right Tools appeared first on Security Intelligence.

Continue reading Cloud Native Tools Series Part 3: Get the Right Tools

What Is SIEM and How Does it Work? The Past, Present and Future

Security information and event management (SIEM) solutions provide organizations centralized visibility into their IT and even sometimes OT environments. At a high level, a SIEM turns data into actionable insights by: Ingesting a vast amount of event data from across the enterprise, including on-premise and cloud-based environments; Applying real-time analytics to aggregate related security events […]

The post What Is SIEM and How Does it Work? The Past, Present and Future appeared first on Security Intelligence.

Continue reading What Is SIEM and How Does it Work? The Past, Present and Future

Why a Security Maturity Model Can Transform How You Use Analytics

With cyberattacks and breaches on the rise, security should be a major concern for all companies. In particular, enabling the development of an analytics maturity model is a useful addition to your traditional security information and event management (SIEM)-based operations. It is possible to step away from only applying the traditional SIEM model with its […]

The post Why a Security Maturity Model Can Transform How You Use Analytics appeared first on Security Intelligence.

Continue reading Why a Security Maturity Model Can Transform How You Use Analytics

How to Create Value With Your (Security) Data Analytics Program

The key factor in the success of any data analytics program, security-focused or otherwise, is how efficient and business-fit the underlying data architecture is.

The post How to Create Value With Your (Security) Data Analytics Program appeared first on Security Intelligence.

Continue reading How to Create Value With Your (Security) Data Analytics Program

Which Incident Response Investments Are You Prioritizing in 2020?

Developing, testing and improving incident response plans should be the number one priority for future investment by organizations, but there are more areas to look into in 2020.

The post Which Incident Response Investments Are You Prioritizing in 2020? appeared first on Security Intelligence.

Continue reading Which Incident Response Investments Are You Prioritizing in 2020?

Okta Enables Entire Organization to Participate in Cybersecurity Defense

At its Okta Showcase event, Okta launched Okta SecurityInsights to expand the base of individuals who can act on cybersecurity threats as they emerge. Joe Diamond, senior director of product marketing for Okta, said as it becomes more apparent that cy… Continue reading Okta Enables Entire Organization to Participate in Cybersecurity Defense

Follow the Leaders: 7 Tried-and-True Tips to Get the Most Out of Your Security Analytics

By following the example of industry leaders with mature security analytics capabilities, less advanced organizations can improve SOC visibility and shift from reactive to proactive threat detection.

The post Follow the Leaders: 7 Tried-and-True Tips to Get the Most Out of Your Security Analytics appeared first on Security Intelligence.

Continue reading Follow the Leaders: 7 Tried-and-True Tips to Get the Most Out of Your Security Analytics

10 Cybersecurity Conference Trips You Should Make Time for This Year

Not sure where to distribute IT budgets for ideal returns? Here’s a roundup of the top 10 cybersecurity conference trips to make time for this year.

The post 10 Cybersecurity Conference Trips You Should Make Time for This Year appeared first on Security Intelligence.

Continue reading 10 Cybersecurity Conference Trips You Should Make Time for This Year

Stay Ahead of the Growing Security Analytics Market With These Best Practices

Armed with security analytics tools, organizations can benefit from big data capabilities to analyze data and enhance detection with proactive alerts about potential malicious activity.

The post Stay Ahead of the Growing Security Analytics Market With These Best Practices appeared first on Security Intelligence.

Continue reading Stay Ahead of the Growing Security Analytics Market With These Best Practices

Advancing Security Operations Through the Power of an SIEM Platform

Thanks to a wealth of new capabilities, security operations teams that leverage a cutting-edge SIEM platform are better armed to defend their organizations from advanced and insider threats.

The post Advancing Security Operations Through the Power of an SIEM Platform appeared first on Security Intelligence.

Continue reading Advancing Security Operations Through the Power of an SIEM Platform