UEBA: Canary in a Coal Mine

User entity behavioral analysis (UEBA) can provide analysts with actionable insights and early warnings of threats, much like a canary in a coal mine.

The post UEBA: Canary in a Coal Mine appeared first on Security Intelligence.

Continue reading UEBA: Canary in a Coal Mine

Becoming an Agile Cyber-Ninja: Implementing SIEM the Right Way in 2017

To get the most out of SIEM tools such as QRadar, security analysts should abandon the traditional Waterfall methodology and adopt the Agile approach.

The post Becoming an Agile Cyber-Ninja: Implementing SIEM the Right Way in 2017 appeared first on Security Intelligence.

Continue reading Becoming an Agile Cyber-Ninja: Implementing SIEM the Right Way in 2017

Becoming an Agile Cyber-Ninja: Implementing SIEM the Right Way in 2017

To get the most out of SIEM tools such as QRadar, security analysts should abandon the traditional Waterfall methodology and adopt the Agile approach.

The post Becoming an Agile Cyber-Ninja: Implementing SIEM the Right Way in 2017 appeared first on Security Intelligence.

Continue reading Becoming an Agile Cyber-Ninja: Implementing SIEM the Right Way in 2017

Watson and Cybersecurity: Bringing AI to the Battle

At InterConnect, Marc van Zadelhoff explained how cognitive technology can revolutionize cybersecurity and the role of the security analyst.

The post Watson and Cybersecurity: Bringing AI to the Battle appeared first on Security Intelligence.

Continue reading Watson and Cybersecurity: Bringing AI to the Battle

Understanding Cyber Threat Hunting

When implementing threat hunting programs for the first time, IT teams should start with basic concepts, then add more capabilities gradually.

The post Understanding Cyber Threat Hunting appeared first on Security Intelligence.

Continue reading Understanding Cyber Threat Hunting

Security Orchestration for an Uncertain World

Security orchestration is the union of people, process and technology — computer automation where it works, and human coordination where it doesn’t.

The post Security Orchestration for an Uncertain World appeared first on Security Intelligence.

Continue reading Security Orchestration for an Uncertain World

QRadar UBA App Adds Machine Learning and Peer Group Analyses to Detect Anomalies in Users’ Activities

User behavior analytics (UBA) solutions enable SOC analysts to reduce the rate of false positives and more accurately detect insider threats.

The post QRadar UBA App Adds Machine Learning and Peer Group Analyses to Detect Anomalies in Users’ Activities appeared first on Security Intelligence.

Continue reading QRadar UBA App Adds Machine Learning and Peer Group Analyses to Detect Anomalies in Users’ Activities

QRadar Waves From the Leader Position in the Forrester 2017 Security Analytics Wave

IBM Security was recognized as a leader in the first ever Forrester Security Analytics Wave, earning the highest scores in solution strength and vision.

The post QRadar Waves From the Leader Position in the Forrester 2017 Security Analytics Wave appeared first on Security Intelligence.

Continue reading QRadar Waves From the Leader Position in the Forrester 2017 Security Analytics Wave

Five Advantages of Cloud-Based SIEM for Security Intelligence and Operations

Moving SIEM to the cloud enables QRadar customers to increase time to value, address the IT skills shortage and maintain control of their infrastructures.

The post Five Advantages of Cloud-Based SIEM for Security Intelligence and Operations appeared first on Security Intelligence.

Continue reading Five Advantages of Cloud-Based SIEM for Security Intelligence and Operations

Five Advantages of Cloud-Based SIEM for Security Intelligence and Operations

Moving SIEM to the cloud enables QRadar customers to increase time to value, address the IT skills shortage and maintain control of their infrastructures.

The post Five Advantages of Cloud-Based SIEM for Security Intelligence and Operations appeared first on Security Intelligence.

Continue reading Five Advantages of Cloud-Based SIEM for Security Intelligence and Operations