Understanding how attackers move inside your organization

Cyberthreats have been coming at us from the left, right, and center. The number of cyberattacks is forever on the rise, and companies need to keep ramping up their security measures to protect themselves. It’s important that these measures …
The post … Continue reading Understanding how attackers move inside your organization

Webinar: The Failed Promises of SIEM – What’s Next For Cybersecurity

The Security Operations Center (SOC) of today is fundamentally flawed. Currently enterprise cybersecurity spend is higher than ever, but despite multi-million dollar cybersecurity investments, organizations remain vulnerable to attacks. One of the majo… Continue reading Webinar: The Failed Promises of SIEM – What’s Next For Cybersecurity

3 Reasons Why a Rule-Based Cybersecurity Platform Will Always Fail

When it comes to advancements in cybersecurity, rule-based systems are holding the industry back. Relying on humans to constantly input and label rules in order to detect and stay ahead of threats is a bottleneck process that is setting security teams … Continue reading 3 Reasons Why a Rule-Based Cybersecurity Platform Will Always Fail

Back in 2015, while working on a Gartner SOC paper, I coined the concept of “SOC nuclear triad”…

Back in 2015, while working on a Gartner SOC paper, I coined the concept of “SOC nuclear triad” which later morphed into “SOC visibility triad” or even “security visibility triad.” The thing then became very popular with some security vendors, especial… Continue reading Back in 2015, while working on a Gartner SOC paper, I coined the concept of “SOC nuclear triad”…

New Article on How to Start with DevSecOps

Github just published an informative guide to moving to DevSecOps.The Github article makes good points and provides clarification on how to shift left
The post New Article on How to Start with DevSecOps appeared first on K2io.
The post New Article on H… Continue reading New Article on How to Start with DevSecOps

How Does Deterministic Security Help Reduce False Positives?

Some organizations are reluctant to block attacks based on their security tool alerts because of the false positives being generated, in this article we take a look at how deterministic security helps to eliminate false positives.
The post How Does Det… Continue reading How Does Deterministic Security Help Reduce False Positives?