Now You SIEM, Now You Don’t —Six Failures of Cybersecurity

Security information and event management (SIEM) frameworks are essential for enterprises to monitor, manage and mitigate the impact of evolving cyberattacks. As the number of threats and the financial impact of breaches increase, these frameworks are even more crucial. Consider ransomware. Since 2020, more than 130 different strains of these encryption and extortion efforts have […]

The post Now You SIEM, Now You Don’t —Six Failures of Cybersecurity appeared first on Security Intelligence.

Continue reading Now You SIEM, Now You Don’t —Six Failures of Cybersecurity

How to Implement Cloud Identity and Access Governance

Creating identity and access governance across cloud environments is crucial for modern organizations. In our previous post, we discussed how important human and non-human identities are for these environments and why their management and the governance of their access can be difficult. In the face of these challenges, our cloud identity and access governance (CIAG) […]

The post How to Implement Cloud Identity and Access Governance appeared first on Security Intelligence.

Continue reading How to Implement Cloud Identity and Access Governance

Identity Fraud: 9 Consumer Scams (and How to Stop Them)

With remote work, e-commerce activity and sophisticated breach capabilities at an all-time high, there is a perfect storm brewing. Identity fraud is not going away anytime soon.  Take a look at nine common types of identity fraud, the warning signs and some identity management advice. This way, you can reduce the risk of falling victim […]

The post Identity Fraud: 9 Consumer Scams (and How to Stop Them) appeared first on Security Intelligence.

Continue reading Identity Fraud: 9 Consumer Scams (and How to Stop Them)

A Journey in Organizational Resilience: The Data Life Cycle

With so many efforts focused on restoring systems, applications and workloads, it is easy to miss an important piece: the data that makes business processes possible. A fully restored system is as good as offline if you don’t have the data required to work. Let’s face it: in the past, technology drove business capabilities. Today, […]

The post A Journey in Organizational Resilience: The Data Life Cycle appeared first on Security Intelligence.

Continue reading A Journey in Organizational Resilience: The Data Life Cycle

What’s Next for SIEM? A View From the 2021 Gartner SIEM Magic Quadrant

Security information and event management (SIEM) solutions continue to evolve, as shown in the 2021 Gartner Magic Quadrant for SIEM, which is a great representation of the changing security landscape and the evolution of key capabilities and experiences that are required to deliver top notch security outcomes. Security teams are busier than ever, as their […]

The post What’s Next for SIEM? A View From the 2021 Gartner SIEM Magic Quadrant appeared first on Security Intelligence.

Continue reading What’s Next for SIEM? A View From the 2021 Gartner SIEM Magic Quadrant

Alert Fatigue: How AI Can Help You Address Your Most Important Alerts

When someone says the word hurricane, I hear the shrill weather-alert warning sound in my head. Having grown up in Florida and now living in North Carolina, I’ve been through many hurricanes and have the routine down — stock up on supplies and hurricane snacks, bring in the patio furniture, fill up the cars with […]

The post Alert Fatigue: How AI Can Help You Address Your Most Important Alerts appeared first on Security Intelligence.

Continue reading Alert Fatigue: How AI Can Help You Address Your Most Important Alerts

What Is SIEM and How Does it Work? The Past, Present and Future

Security information and event management (SIEM) solutions provide organizations centralized visibility into their IT and even sometimes OT environments. At a high level, a SIEM turns data into actionable insights by: Ingesting a vast amount of event data from across the enterprise, including on-premise and cloud-based environments; Applying real-time analytics to aggregate related security events […]

The post What Is SIEM and How Does it Work? The Past, Present and Future appeared first on Security Intelligence.

Continue reading What Is SIEM and How Does it Work? The Past, Present and Future

How to Use Best-in-Suite MSSPs to Streamline Security Operations

Managed security service providers (MSSPs) can speed up detection and response capabilities in complex, distributed security environments. However, many traditional managed security providers simply act as alert factories that collect log data and spit out low-value alerts. These increase the workload on their clients’ security teams rather than offloading work and enhancing their security posture. […]

The post How to Use Best-in-Suite MSSPs to Streamline Security Operations appeared first on Security Intelligence.

Continue reading How to Use Best-in-Suite MSSPs to Streamline Security Operations

Become a JSON Formatter — and Kick Your Security Integrations Into Action

Becoming a JSON formatter, and packing up your data in a new way, can reduce or eliminate the need for custom work and save your security team precious time.

The post Become a JSON Formatter — and Kick Your Security Integrations Into Action appeared first on Security Intelligence.

Continue reading Become a JSON Formatter — and Kick Your Security Integrations Into Action

Spot (and Remedy) the Rotten Apple Before It Spoils the SIEM Barrel

It can be hard to determine false alarm security events with SIEM solutions. Through IBM’s new partnership with AlgoSec, your team has a new tool to help.

The post Spot (and Remedy) the Rotten Apple Before It Spoils the SIEM Barrel appeared first on Security Intelligence.

Continue reading Spot (and Remedy) the Rotten Apple Before It Spoils the SIEM Barrel