Why You Should Act Now to Prevent Peer-to-Peer Payments Network Fraud

Financial institutions seeking a piece of the hot P2P payments market must act to prevent network fraud with a multilayered prevention approach that includes a robust fraud detection engine.

The post Why You Should Act Now to Prevent Peer-to-Peer Payments Network Fraud appeared first on Security Intelligence.

Continue reading Why You Should Act Now to Prevent Peer-to-Peer Payments Network Fraud

Why User Behavior Analytics Is an Application, Not a Cybersecurity Platform

User behavior analytics (UBA) is a good application, but it isn’t a replacement for SIEM. UBA is more accurately described as a cybersecurity application that can be added on top of an SIEM tool.

The post Why User Behavior Analytics Is an Application, Not a Cybersecurity Platform appeared first on Security Intelligence.

Continue reading Why User Behavior Analytics Is an Application, Not a Cybersecurity Platform

Why You Should Start Leveraging Network Flow Data Before the Next Big Breach

One of the most crucial types of information for threat detection and incident response is network flow data, which has several unique properties that can help security analysts uncover attacks.

The post Why You Should Start Leveraging Network Flow Data Before the Next Big Breach appeared first on Security Intelligence.

Continue reading Why You Should Start Leveraging Network Flow Data Before the Next Big Breach

How to Avoid the Trap of Fragmented Security Analytics

To move toward deep, advanced security analytics, CISOs should replace their fragmented tools with a platform-based approach that can leverage a broad set of data.

The post How to Avoid the Trap of Fragmented Security Analytics appeared first on Security Intelligence.

Continue reading How to Avoid the Trap of Fragmented Security Analytics

Customer Focus Drives Leadership in SIEM, Security Analytics

We’ve seen many changes in the SIEM and security analytics space over the last decade, but throughout that time, IBM QRadar has consistently innovated and led the market in addressing new threats.

The post Customer Focus Drives Leadership in SIEM, Security Analytics appeared first on Security Intelligence.

Continue reading Customer Focus Drives Leadership in SIEM, Security Analytics

DeepLocker: How AI Can Power a Stealthy New Breed of Malware

DeepLocker has changed the game of malware evasion by taking a fundamentally different approach from any other current evasive and targeted malware. Here’s what you need to know.

The post DeepLocker: How AI Can Power a Stealthy New Breed of Malware appeared first on Security Intelligence.

Continue reading DeepLocker: How AI Can Power a Stealthy New Breed of Malware

What’s On the Horizon for SIEM Technology? Five Upcoming Innovations in Security Analytics

As cloud adoption increases, the IT skills gap widens and the threat landscape becomes more sophisticated, innovations in SIEM technology will revolutionize the way SOCs perform security analytics.

The post What’s On the Horizon for SIEM Technology? Five Upcoming Innovations in Security Analytics appeared first on Security Intelligence.

Continue reading What’s On the Horizon for SIEM Technology? Five Upcoming Innovations in Security Analytics

A W-2 Nor’easter: Digging SOC Analysts Out From Under Tax Fraud False Positives

SOC analysts face blizzardlike conditions during tax season as false positives pile up and legitimate tax fraud alerts are liable to fly under the radar.

The post A W-2 Nor’easter: Digging SOC Analysts Out From Under Tax Fraud False Positives appeared first on Security Intelligence.

Continue reading A W-2 Nor’easter: Digging SOC Analysts Out From Under Tax Fraud False Positives

Great Expectations: Building a Winning Cybersecurity Franchise With a Security Operations Center

Like any good sports franchise, a successful security operations center must be built to win now and to meet the ever-evolving challenges of the future.

The post Great Expectations: Building a Winning Cybersecurity Franchise With a Security Operations Center appeared first on Security Intelligence.

Continue reading Great Expectations: Building a Winning Cybersecurity Franchise With a Security Operations Center

DevSecOps: Cisco Extends Scope of Security Analytics Platform

Cisco Systems is extending the reach and scope the security capabilities of the Tetration analytics platform to include identification of software vulnerabilities and exposures, baselining process behavior and identifying any deviations. The goal is to… Continue reading DevSecOps: Cisco Extends Scope of Security Analytics Platform