How To Drive Value with Security Data – The Full Talk

Last week I keynoted LogPoint’s customer conference with a talk about how to extract value from security data. Pretty much every company out there has tried to somehow leverage their log data to manage their infrastructure and protect their assets and … Continue reading How To Drive Value with Security Data – The Full Talk

A Logging History Lesson – From syslogd(8) to XDR

The log management and security information management (SIEM) space have gone through a number of stages to arrive where they are today. I started mapping the space in the 1980’s when syslog entered the world. To make sense of the really busy diagram, … Continue reading A Logging History Lesson – From syslogd(8) to XDR

Taking Inventory – Where Do We Stand With AI and ML in Cyber Security?

Before diving into cyber security and how the industry is using AI at this point, let’s define the term AI first. Artificial Intelligence (AI), as the term is used today, is the overarching concept covering machine learning (supervised, including Deep … Continue reading Taking Inventory – Where Do We Stand With AI and ML in Cyber Security?

2021 Cyber Security Focus: “Unbound”

It’s already early March and the year is in full swing. Covid is still raging and we have been seeing some crazy weather patterns, especially in the south of the United States. While snowed in here in Texas, I took some time to reflect on what’s drivin… Continue reading 2021 Cyber Security Focus: “Unbound”

Security Money: July 15, 2019 – Business Security Weekly #136

    This week we have our quarterly segment to review the money of security, including public companies, IPOs, funding rounds and acquisitions from the previous quarter. We also update the Security Weekly 25 index. Let’s understand how the securi… Continue reading Security Money: July 15, 2019 – Business Security Weekly #136

5 Security Big Data Challenges

Previously, I started blogging about individual topics and slides from my keynote at ACSAC 2017. The first topic I elaborated on a little bit was An Incomplete Security Big Data History. In this post I want to focus on the last slide in the presentatio… Continue reading 5 Security Big Data Challenges