Sophisticated phishing

Most of us can think of a time when we received a phishing email. In fact, most phishing emails are easy to identify, and automatically go to spam.
However, in this ongoing pandemic, hackers are adopting advanced tactics that cleverly …
The post Sophis… Continue reading Sophisticated phishing

Enhancing Visibility with Bitglass and Splunk

The complexity of organizations’ IT infrastructures is always increasing. Modern businesses are faced with cloud-based resources like software-as-a-service apps and infrastructure-as-a-service platforms, as well as personal devices, a diffuse remote w… Continue reading Enhancing Visibility with Bitglass and Splunk

Threat intelligence platform market to reach $234.9 million by 2022

The growing volume and complexities of cyber threats present a compelling case for adopting threat intelligence platforms (TIPs), a Frost & Sullivan analysis finds. These solutions help organizations navigate the ever-increasing threat landscape a… Continue reading Threat intelligence platform market to reach $234.9 million by 2022

Webinar Recap: The Failed Promises of SIEM

MixMode teamed up with Ravenii to host a webinar focused on the history and evolution of SIEM platforms, their ideal role in a SOC today, and how they fall short as a threat detection tool in today’s modern cybersecurity environment.
The post Webinar R… Continue reading Webinar Recap: The Failed Promises of SIEM

The Evolution of SIEM

It should be noted that SIEM platforms are exceptionally effective at what they initially were intended for: providing enterprise teams with a central repository of log information that would allow them to conduct search and investigation activities ag… Continue reading The Evolution of SIEM

The brain of the SIEM and SOAR

SIEM and SOAR solutions are important tools in a cybersecurity stack. They gather a wealth of data about potential security incidents throughout your system and store that info for review. But just like nerve endings in the body sending signals, what g… Continue reading The brain of the SIEM and SOAR

Monitoring and Vulnerability Management

 (Cross posted from the Securonix Blog)
Vulnerability management is one of the most basic security hygiene practices organizations must have in place to avoid being hacked. However, even being a primary security control doesn’t make it simple to succes… Continue reading Monitoring and Vulnerability Management

Beating alert fatigue with integrated data

By Alex Kirk, Corelight Global Principal for Suricata More than 15 years after Gartner declared that “IDS is dead” because it was too noisy to be effectively managed, alert fatigue continues to be a central theme of life in modern SOCs, with a majority… Continue reading Beating alert fatigue with integrated data

Whitepaper: The Failed Promises of SIEM

The fundamental SIEM flaws lie in the platform’s need for continual adjustment, endless data stores, and a tendency to create an overwhelming number of false positives. When organizations instead turn to a next-generation cybersecurity solution, which … Continue reading Whitepaper: The Failed Promises of SIEM

How Data Normalization in Cybersecurity Impacts Regulatory Compliance

Complying with privacy regulations requires all organizations to have access to data on demand, wherever it lives on a network. With the unfathomable amount of data managed by most organizations operating in the finance space today, it can become a sig… Continue reading How Data Normalization in Cybersecurity Impacts Regulatory Compliance