Three Steps to Secure Your AWS Environment Using IBM QRadar

IBM QRadar can help you secure your AWS environment by checking for misconfigurations, monitoring for anomalous activity and curating content rules.

The post Three Steps to Secure Your AWS Environment Using IBM QRadar appeared first on Security Intelligence.

Continue reading Three Steps to Secure Your AWS Environment Using IBM QRadar

Innovation, Collaboration and Security Awareness: What We’re Grateful for This Thanksgiving

On this holiday, see what our contributors are thankful for in the world of cybersecurity, including improved security awareness and continued innovation.

The post Innovation, Collaboration and Security Awareness: What We’re Grateful for This Thanksgiving appeared first on Security Intelligence.

Continue reading Innovation, Collaboration and Security Awareness: What We’re Grateful for This Thanksgiving

Why Knock Innovation? SIEM Didn’t Die — It Evolved

SIEM has evolved from its comparatively humble beginnings to integrate user behavior analysis and log management capabilities that are critical to any SOC.

The post Why Knock Innovation? SIEM Didn’t Die — It Evolved appeared first on Security Intelligence.

Continue reading Why Knock Innovation? SIEM Didn’t Die — It Evolved

Don’t Worry About the KRACK Vulnerability — Just Create a Team of Superheroes!

There is no silver bullet to thwart the KRACK vulnerability, but a security intelligence platform can help analysts become security superheroes.

The post Don’t Worry About the KRACK Vulnerability — Just Create a Team of Superheroes! appeared first on Security Intelligence.

Continue reading Don’t Worry About the KRACK Vulnerability — Just Create a Team of Superheroes!

Don’t Worry About the KRACK Vulnerability — Just Create a Team of Superheroes!

There is no silver bullet to thwart the KRACK vulnerability, but a security intelligence platform can help analysts become security superheroes.

The post Don’t Worry About the KRACK Vulnerability — Just Create a Team of Superheroes! appeared first on Security Intelligence.

Continue reading Don’t Worry About the KRACK Vulnerability — Just Create a Team of Superheroes!

Proactive or Reactive Endpoint Security? A Critical Crossroads for SOC Analysts

As the cybercrime landscape expands, SOC teams need endpoint security tools that can reduce the time it takes to gain actionable threat intelligence.

The post Proactive or Reactive Endpoint Security? A Critical Crossroads for SOC Analysts appeared first on Security Intelligence.

Continue reading Proactive or Reactive Endpoint Security? A Critical Crossroads for SOC Analysts

Threat Intelligence: A Tear-Free Solution to Help SOC Analysis Prepare for the Next WannaCry

An effective threat intelligence solution enables analysts to address, track and investigate advanced attacks such as WannaCry ransomware.

The post Threat Intelligence: A Tear-Free Solution to Help SOC Analysis Prepare for the Next WannaCry appeared first on Security Intelligence.

Continue reading Threat Intelligence: A Tear-Free Solution to Help SOC Analysis Prepare for the Next WannaCry

False Positives Are a True Negative: Using Machine Learning to Improve Accuracy

Machine learning can be a boon for businesses, but effective machine learning must help analysts cut through the noise with few false positives.

The post False Positives Are a True Negative: Using Machine Learning to Improve Accuracy appeared first on Security Intelligence.

Continue reading False Positives Are a True Negative: Using Machine Learning to Improve Accuracy

From Suspicious Activity to Suspended Account in Less Than a Minute: Stopping Insider Threats With Automation

To protect corporate data from insider threats, security teams should leverage cognitive-enabled UBA and IGI solutions to measure users’ risk scores.

The post From Suspicious Activity to Suspended Account in Less Than a Minute: Stopping Insider Threats With Automation appeared first on Security Intelligence.

Continue reading From Suspicious Activity to Suspended Account in Less Than a Minute: Stopping Insider Threats With Automation

A Basic Model to Measure SIEM Maturity

Companies looking to improve their ability to protect, control and monitor their technology infrastructures should follow this basic SIEM maturity model.

The post A Basic Model to Measure SIEM Maturity appeared first on Security Intelligence.

Continue reading A Basic Model to Measure SIEM Maturity