Does your security program suffer from piecemeal detection and response?

Piecemeal Detection and Response (PDR) can manifest in various ways. The most common symptoms of PDR include: Multiple security information and event management (SIEM) tools (e.g., one on-premise and one in the cloud) Spending too much time or energy on integrating detection systems An underperforming security orchestration, automation and response (SOAR) system Only capable of […]

The post Does your security program suffer from piecemeal detection and response? appeared first on Security Intelligence.

Continue reading Does your security program suffer from piecemeal detection and response?

How I got started: SIEM engineer

As careers in cybersecurity become increasingly more specialized, Security Information and Event Management (SIEM) engineers are playing a more prominent role. These professionals are like forensic specialists but are also on the front lines protecting sensitive information from the relentless onslaught of cyber threats. SIEM engineers meticulously monitor, analyze and manage security events and incidents […]

The post How I got started: SIEM engineer appeared first on Security Intelligence.

Continue reading How I got started: SIEM engineer

How IBM secures the U.S. Open

More than 15 million tennis fans around the world visited the US Open app and website this year, checking scores, poring over statistics and watching highlights from hundreds of matches over the two weeks of the tournament. To help develop this world-class digital experience, IBM Consulting worked closely with the USTA, developing powerful generative AI […]

The post How IBM secures the U.S. Open appeared first on Security Intelligence.

Continue reading How IBM secures the U.S. Open

From Caribbean shores to your devices: analyzing Cuba ransomware

The article analyzes the malicious tactics, techniques and procedures (TTP) used by the operator of the Cuba ransomware, and details a Cuba attack incident. Continue reading From Caribbean shores to your devices: analyzing Cuba ransomware

Machine learning operations can revolutionize cybersecurity

Machine learning operations (MLOps) refers to the practices and tools employed to streamline the deployment, management and monitoring of machine learning models in production environments. While MLOps is commonly associated with data science and machine learning workflows, its integration with cybersecurity brings new capabilities to detect and respond to threats in real-time. It involves streamlining […]

The post Machine learning operations can revolutionize cybersecurity appeared first on Security Intelligence.

Continue reading Machine learning operations can revolutionize cybersecurity

Zero-day attacks are on the rise. Can patches keep up?

That latest cyberattack threatening your organization is likely coming from outside the corporate network. According to Mandiant’s M-Trends 2023 report, 63% of breaches came from an outside entity — a considerable rise from 47% the year before. When it comes to how intruders are getting into the network, it depends on the organization’s location. Spearphishing […]

The post Zero-day attacks are on the rise. Can patches keep up? appeared first on Security Intelligence.

Continue reading Zero-day attacks are on the rise. Can patches keep up?

The future of SIEM: Embracing predictive analytics

Security information and event management (SIEM) is a crucial tool that offers real-time monitoring and analysis of security-related events as well as tracking and logging of security data for compliance or auditing purposes. SIEM plays an important role in identifying security incidents and helping IT and security teams respond effectively. However, as threats become more […]

The post The future of SIEM: Embracing predictive analytics appeared first on Security Intelligence.

Continue reading The future of SIEM: Embracing predictive analytics

Vulnerability management, its impact and threat modeling methodologies

Vulnerability management is a security practice designed to avoid events that could potentially harm an organization. It is a regular ongoing process that identifies, assesses, and manages vulnerabilities across all the components of an IT ecosystem. Cybersecurity is one of the major priorities many organizations struggle to stay on top of. There is a huge […]

The post Vulnerability management, its impact and threat modeling methodologies appeared first on Security Intelligence.

Continue reading Vulnerability management, its impact and threat modeling methodologies

X-Force releases detection & response framework for managed file transfer software

How AI can help defenders scale detection guidance for enterprise software tools If we look back at mass exploitation events that shook the security industry like Log4j, Atlassian, and Microsoft Exchange when these solutions were actively being exploited by attackers, the exploits may have been associated with a different CVE, but the detection and response […]

The post X-Force releases detection & response framework for managed file transfer software appeared first on Security Intelligence.

Continue reading X-Force releases detection & response framework for managed file transfer software

The evolution of security analyst experience

Cloud computing and IT modernization have created a more complex threat landscape, and security analysts are struggling to keep up. Security operations centers (SOC) are in need of an upgrade. The proliferation of cloud and hybrid environments simply creates more to protect, said Andie Schroeder, program director of product management at IBM Security, at RSAC […]

The post The evolution of security analyst experience appeared first on Security Intelligence.

Continue reading The evolution of security analyst experience