Misconceptions of the SOAR “Playbook”

Most customers are surprised to learn that SOAR platforms rely on invoking 3rd party technologies, including next-generation firewalls and endpoint protection platforms via traditional API calls to isolate and quarantine malicious threats and users.
Th… Continue reading Misconceptions of the SOAR “Playbook”

3GPP standards enrich LTE and 5G with network architecture enhancements

Despite the impact of COVID-19, momentum for enhancements to LTE and 5G standards continue with additional releases from the Third Generation Partnership Project (3GPP). 5G Americas announced the publication of a white paper providing an update on the … Continue reading 3GPP standards enrich LTE and 5G with network architecture enhancements

Threat actors’ dangerous and rising interest in the global energy industry

The energy sector is no stranger to digital transformation. Like so many industries before it, energy is currently in the midst of significant digital growth, thanks to developments in artificial intelligence (AI), the Internet of Things (IOT), blockch… Continue reading Threat actors’ dangerous and rising interest in the global energy industry

Our Top 2020 Cybersecurity Insights

The transition from office to remote environments was abrupt and one of the most defining moments that the cybersecurity industry and professionals faced in 2020. We wrote about the top issues CISOs were facing throughout the year but also doubled down… Continue reading Our Top 2020 Cybersecurity Insights

How Vendors Capitalize on SIEM’s Fundamental Flaws

Because the fundamental nature of SIEM requires infinite amounts of data, security teams are forced to constantly wrangle their network data and faced with an unmanageable number of false positive alerts. This means they have to devise efficient ways t… Continue reading How Vendors Capitalize on SIEM’s Fundamental Flaws

The Evolution of SIEM

It should be noted that SIEM platforms are exceptionally effective at what they initially were intended for: providing enterprise teams with a central repository of log information that would allow them to conduct search and investigation activities ag… Continue reading The Evolution of SIEM

Whitepaper: The Failed Promises of SIEM

The fundamental SIEM flaws lie in the platform’s need for continual adjustment, endless data stores, and a tendency to create an overwhelming number of false positives. When organizations instead turn to a next-generation cybersecurity solution, which … Continue reading Whitepaper: The Failed Promises of SIEM

How Data Normalization in Cybersecurity Impacts Regulatory Compliance

Complying with privacy regulations requires all organizations to have access to data on demand, wherever it lives on a network. With the unfathomable amount of data managed by most organizations operating in the finance space today, it can become a sig… Continue reading How Data Normalization in Cybersecurity Impacts Regulatory Compliance

Cómo madurar un programa de gestión de vulnerabilidades

El panorama global de ciber-amenazas se encuentra en constante evolución lo cual resalta la necesidad emergente de que las organizaciones fortalezcan su capacidad para identificar, analizar y evaluar los riesgos tecnológicos antes de que evolucionen a … Continue reading Cómo madurar un programa de gestión de vulnerabilidades