How Does Deterministic Security Help Reduce False Positives?

Some organizations are reluctant to block attacks based on their security tool alerts because of the false positives being generated, in this article we take a look at how deterministic security helps to eliminate false positives.
The post How Does Det… Continue reading How Does Deterministic Security Help Reduce False Positives?

Why Block Attackers at the Network Edge?

Many still consider their network security devices sufficient security for their web applications.  Is the difference between network security and web application security a bit of a puzzle for you? If so, you’re not alone.
The post Why Block Attackers… Continue reading Why Block Attackers at the Network Edge?

NDR for AWS Well-Architected

By Roger Cheeks, US-East Sales Engineer, Corelight Corelight is a powerful network traffic analysis tool that enables network detection and response (NDR) for AWS Cloud workloads by receiving packets from an AWS Virtual Private Cloud (VPC) traffic mirr… Continue reading NDR for AWS Well-Architected

Webinar Recap: The Next-Generation AI Powered SOC Platform

One thing is clear: more spend does not equal more security and the next generation of cybersecurity tools will route out these inefficiencies.
The post Webinar Recap: The Next-Generation AI Powered SOC Platform appeared first on Security Boulevard.
Continue reading Webinar Recap: The Next-Generation AI Powered SOC Platform

Web Application Security Vs. Network Security

Many still consider their network security devices sufficient security for their web applications.  Is the difference between network security and web application security a bit of a puzzle for you? If so, you’re not alone.
The post Web Applicatio… Continue reading Web Application Security Vs. Network Security

Modern SIEM Mysteries

Look outside, we are in 2020 (can anybody really forget that?). So, we are not in 2002 anymore (perhaps the birth year of modern-ish SIEM), neither are we in 2012…
So, depending on how you count, SIEM technology (and SIM/SEM before it) has e… Continue reading Modern SIEM Mysteries

Security Alerts Double and Security Teams Can’t Get to Them All

A new survey of IT professionals, that revealed that security alerts have doubled over the last five year for 70% of the respondents.  In addition, 75% said that they would need an additional 3 or more staff to address all the security alerts that… Continue reading Security Alerts Double and Security Teams Can’t Get to Them All

Cyderes CNAP Makes SIEM Modernization a Snap

Note: Yes, this is written while wearing my vendor hat. But do keep in mind that I only work on things I believe in! So, don’t knock that hat off my head :-)
If you recall my post “So, Chronicle, Are You A SIEM?”, the conversatio… Continue reading Cyderes CNAP Makes SIEM Modernization a Snap

NTA and NDR: The Missing Piece

Most SIEM vendors acknowledge the value of network traffic data for leading indicators of attacks, anomaly detection, and user behavior analysis as being far more useful than log data. Ironically, network traffic data is often expressly excluded from S… Continue reading NTA and NDR: The Missing Piece