File security violations within organizations have spiked 134% as the world reopened for business

BetterCloud surveyed more than 500 IT and security professionals—and examined internal data from thousands of organizations and users—to understand their top challenges, priorities, and the magnitude of data loss and sensitive information leaks. “Last … Continue reading File security violations within organizations have spiked 134% as the world reopened for business

Real-Time Threat Assessment With In-Memory Computing

Today’s security information and event management (SIEM) solutions are inundated with incoming events and tracking potential threats to network infrastructure. Significant events must be identified and correlated to detect lateral movement and kill ch… Continue reading Real-Time Threat Assessment With In-Memory Computing

XDR: Security’s new frontier

As enterprises transform their IT environment and workforce, finding the right security approach is critical for success. Without the proper protective measures in place, moving services to the cloud can introduce a great deal of risk. For a truly futu… Continue reading XDR: Security’s new frontier

Si no podemos ver, no podemos proteger

Hoy todas las organizaciones cuentan con al menos dos soluciones de seguridad informática, algunas de ellas siguen lineamientos de seguridad como “compliance” (ISO, SOX, PCI, etc) y otras no tanto; pero la mayoría cuenta con algún procedimiento de seg… Continue reading Si no podemos ver, no podemos proteger

Sumo Logic Extends AWS Alliance to Launch SIEM Service

Sumo Logic this week announced it is making a security information event management (SIEM) platform available on the Amazon Web Services (AWS) cloud. Jabari Norton, vice president of partners and alliances for Sumo Logic, said the Sumo Logic Cloud SIE… Continue reading Sumo Logic Extends AWS Alliance to Launch SIEM Service

Rethinking SIEM requires rethinking visibility

Security professionals now generally recognize that siloed security tools and systems have undercut efforts to find active attacks more quickly and efficiently. Information security began decades ago with strategies of taking a layered approach and eve… Continue reading Rethinking SIEM requires rethinking visibility

XDR: Moving Beyond the Limits of SIEM and SOAR

Organizations around the world are under siege from cyberattacks, and they need tools that can protect against malware, exploits, and increasingly sophisticated attacks on both devices and users. SIEM, SOAR and EDR technologies all have their bene… Continue reading XDR: Moving Beyond the Limits of SIEM and SOAR

Construindo uma lista completa de verificação de segurança de rede

Entender o que auditar em uma rede pode ser caótico e confuso. Construir uma lista de verificação de segurança de rede completa é crucial para organizações com computadores conectados à Internet ou entre si. Pense nisso como uma varredura antivírus …
T… Continue reading Construindo uma lista completa de verificação de segurança de rede