Improving on the Typical SIEM Model

Despite its inherent flaws, today’s SIEM software solutions still shine when it comes to searching and investigating log data. One effective, comprehensive approach to network security pairs the best parts of SIEM with modern, AI-driven predictive anal… Continue reading Improving on the Typical SIEM Model

Five worthy reads: Preparing an incident response plan for the pandemic and beyond

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. With the rising concern over cyberattacks in the distributed workforce, this week we explore the concept of cybersecurity in… Continue reading Five worthy reads: Preparing an incident response plan for the pandemic and beyond

Sophisticated phishing

Most of us can think of a time when we received a phishing email. In fact, most phishing emails are easy to identify, and automatically go to spam.
However, in this ongoing pandemic, hackers are adopting advanced tactics that cleverly …
The post Sophis… Continue reading Sophisticated phishing

Enhancing Visibility with Bitglass and Splunk

The complexity of organizations’ IT infrastructures is always increasing. Modern businesses are faced with cloud-based resources like software-as-a-service apps and infrastructure-as-a-service platforms, as well as personal devices, a diffuse remote w… Continue reading Enhancing Visibility with Bitglass and Splunk

Threat intelligence platform market to reach $234.9 million by 2022

The growing volume and complexities of cyber threats present a compelling case for adopting threat intelligence platforms (TIPs), a Frost & Sullivan analysis finds. These solutions help organizations navigate the ever-increasing threat landscape a… Continue reading Threat intelligence platform market to reach $234.9 million by 2022

Webinar Recap: The Failed Promises of SIEM

MixMode teamed up with Ravenii to host a webinar focused on the history and evolution of SIEM platforms, their ideal role in a SOC today, and how they fall short as a threat detection tool in today’s modern cybersecurity environment.
The post Webinar R… Continue reading Webinar Recap: The Failed Promises of SIEM

The Evolution of SIEM

It should be noted that SIEM platforms are exceptionally effective at what they initially were intended for: providing enterprise teams with a central repository of log information that would allow them to conduct search and investigation activities ag… Continue reading The Evolution of SIEM

The brain of the SIEM and SOAR

SIEM and SOAR solutions are important tools in a cybersecurity stack. They gather a wealth of data about potential security incidents throughout your system and store that info for review. But just like nerve endings in the body sending signals, what g… Continue reading The brain of the SIEM and SOAR

Monitoring and Vulnerability Management

 (Cross posted from the Securonix Blog)
Vulnerability management is one of the most basic security hygiene practices organizations must have in place to avoid being hacked. However, even being a primary security control doesn’t make it simple to succes… Continue reading Monitoring and Vulnerability Management

Beating alert fatigue with integrated data

By Alex Kirk, Corelight Global Principal for Suricata More than 15 years after Gartner declared that “IDS is dead” because it was too noisy to be effectively managed, alert fatigue continues to be a central theme of life in modern SOCs, with a majority… Continue reading Beating alert fatigue with integrated data