6 Ways to Mitigate Risk While Expanding Access

The World Economic Forum recently published a list of trends that are likely to shape the future of cybersecurity by 2030. The article names “progress in cybersecurity, but access must be widened” as a top trend. If these two goals seem contradictory, it’s because they are. Today’s business model requires that systems, people and devices have […]

The post 6 Ways to Mitigate Risk While Expanding Access appeared first on Security Intelligence.

Continue reading 6 Ways to Mitigate Risk While Expanding Access

Now You SIEM, Now You Don’t —Six Failures of Cybersecurity

Security information and event management (SIEM) frameworks are essential for enterprises to monitor, manage and mitigate the impact of evolving cyberattacks. As the number of threats and the financial impact of breaches increase, these frameworks are even more crucial. Consider ransomware. Since 2020, more than 130 different strains of these encryption and extortion efforts have […]

The post Now You SIEM, Now You Don’t —Six Failures of Cybersecurity appeared first on Security Intelligence.

Continue reading Now You SIEM, Now You Don’t —Six Failures of Cybersecurity

A Journey in Organizational Resilience: Supply Chain and Third Parties

The next stop on our journey focuses on those that you rely on: supply chains and third parties.  Working with external partners can be difficult. But, there is a silver lining. Recent attacks have resulted in an industry wake-up call when it comes to cybersecurity resilience. You see, the purpose of using external partners is […]

The post A Journey in Organizational Resilience: Supply Chain and Third Parties appeared first on Security Intelligence.

Continue reading A Journey in Organizational Resilience: Supply Chain and Third Parties

Surge of New Digital Accounts During the Pandemic Leads to Lingering Security Side Effects

How many online accounts did you open during the pandemic? A new survey examines the impact of this digital surge on risk to consumers and businesses alike. The unexpected nature of a global pandemic that washed over the entire world left everyone scrambling to maintain their daily activities and work as best they could. With […]

The post Surge of New Digital Accounts During the Pandemic Leads to Lingering Security Side Effects appeared first on Security Intelligence.

Continue reading Surge of New Digital Accounts During the Pandemic Leads to Lingering Security Side Effects

Everyone Wants to Build a Cyber Range: Should You? Part 2

The COVID-19 pandemic has shifted the way we work, and a large variety of teams have either gone virtual or hybrid, working remotely in some capacity, including IT and security teams. In a pandemic or other crisis, security teams that wish to stay sharp and continue to work on their incident response capabilities should consider […]

The post Everyone Wants to Build a Cyber Range: Should You? Part 2 appeared first on Security Intelligence.

Continue reading Everyone Wants to Build a Cyber Range: Should You? Part 2

What is Network Detection and Response and Why is it So Important?

Networks are the foundation of today’s connected world. They allow millions of people, devices, apps and systems to talk with one another every minute of the day. Without networks, modern communication as we know it would cease to exist. Today’s organizations depend on networks and their critical role in overall IT infrastructure. So, it’s no […]

The post What is Network Detection and Response and Why is it So Important? appeared first on Security Intelligence.

Continue reading What is Network Detection and Response and Why is it So Important?

Zero Trust or Bust: What It Is and Why It Matters to Data Security

How many different ways can data be compromised? First, both external and internal threats can target it. External threats can come in the form of malware or ransomware. Meanwhile, internal threats can come from malicious insiders working from behind trusted accounts. Insiders can become a threat simply by clicking a phishing link or being tricked […]

The post Zero Trust or Bust: What It Is and Why It Matters to Data Security appeared first on Security Intelligence.

Continue reading Zero Trust or Bust: What It Is and Why It Matters to Data Security

Turning Down the Noise: Adding Context to the SIEM With Modern Data Security

Let’s say I tell you that my daughter crawled today. However, you don’t know if my daughter is an infant or 30 years old. If you ask, and I tell you my daughter is an infant, you still don’t know if she’s already been crawling or today marks the first time. If this is the […]

The post Turning Down the Noise: Adding Context to the SIEM With Modern Data Security appeared first on Security Intelligence.

Continue reading Turning Down the Noise: Adding Context to the SIEM With Modern Data Security

BlueHat IL 2018, Vincent Le Toux & Benjamin Delpy’s ‘What Can Make Your Million Dollar SIEM Go Blind’

via Firewall Consultants!
Permalink
The post BlueHat IL 2018, Vincent Le Toux & Benjamin Delpy’s ‘What Can Make Your Million Dollar SIEM Go Blind’ appeared first on Security Boulevard.
Continue reading BlueHat IL 2018, Vincent Le Toux & Benjamin Delpy’s ‘What Can Make Your Million Dollar SIEM Go Blind’