Why SIEMs need threat intelligence to defeat Cyberthreats

Security professionals the world over crave compliance management and the ability to pull deep insights from their complex IT environments. This need was the catalyst for the initial adoption of security information and event management (SIEM), which, … Continue reading Why SIEMs need threat intelligence to defeat Cyberthreats

5 user behavioral patterns to look out for in a decentralized workspace

Problem: If there are thousands of employees scattered around hundreds of places, how do you keep your organization’s network safe?
Solution: You should monitor your employees wherever they’re located, and devise a standard baseline of their behavior … Continue reading 5 user behavioral patterns to look out for in a decentralized workspace

Featured Use Case: Why a Large Government Entity Replaced Their SIEM with MixMode

Despite a three-year SIEM deployment and a two-year UBA deployment, government personnel needed an alternative to better detect and manage threats in real-time, as well as an improved platform for gathering comprehensive data.
The post Featured Use Cas… Continue reading Featured Use Case: Why a Large Government Entity Replaced Their SIEM with MixMode

Why Network Data Should be the Foundation of Your Security Strategy

The post Why Network Data Should be the Foundation of Your Security Strategy appeared first on Security Weekly. Continue reading Why Network Data Should be the Foundation of Your Security Strategy

How Vendors Capitalize on SIEM’s Fundamental Flaws

Because the fundamental nature of SIEM requires infinite amounts of data, security teams are forced to constantly wrangle their network data and faced with an unmanageable number of false positive alerts. This means they have to devise efficient ways t… Continue reading How Vendors Capitalize on SIEM’s Fundamental Flaws

Sysmon Endpoint Monitoring: Do You Really Need an EDR?

The post Sysmon Endpoint Monitoring: Do You Really Need an EDR? appeared first on Security Weekly. Continue reading Sysmon Endpoint Monitoring: Do You Really Need an EDR?

A Return to Logs to Unjam the Security Deficit

Some years ago, during the renaissance of security information and event management (SIEM), security became log crazy. The hope was that by gathering logs from networking and security devices and running them through the SIEM, security events could be… Continue reading A Return to Logs to Unjam the Security Deficit

The Case Against Using a Frankenstein Cybersecurity Platform

The cybersecurity market has, simply put, been cobbled together. A tangled web of non-integrated systems and alerts from siloed systems. Enterprises are now being forced to utilize a “Frankenstein” of stitched together tools to create a platform that m… Continue reading The Case Against Using a Frankenstein Cybersecurity Platform

What Security Data Do I Really Need to Collect and Analyze?

The post What Security Data Do I Really Need to Collect and Analyze? appeared first on Security Weekly. Continue reading What Security Data Do I Really Need to Collect and Analyze?