Proactive real-time security intelligence: Moving beyond conventional SIEM
Surprisingly, discussions about security intelligence still focus primarily around conventional reactive Security Incident and Event Management systems (SIEM). However, in …
The slow death of static security detections: Beginning of SIEM deployments
Machines both mechanical and electric have always been good at counting things. Ask anyone from an earlier generation who still uses a Victor Champion adding machine from the …
Adding context to security data to achieve visibility into attacks
At RSA Conference 2015, RSA announced new capabilities have been added to its Security Analytics solution, which is engineered to give organizations the necessary context to …
Fox-IT launches cyberthreat management platform
Fox-IT launched at RSA Conference 2015 in San Francisco its Cyberthreat Management Platform, a suite of solutions, integration tools and expert services designed to provide …
Four advantages of an identity behavior-based approach to cybersecurity
With an ever-increasing number of data breaches, more money is being poured into IT security budgets. According to Gartner, the average global security budget increased 8 …
Critical factors in preventing data breaches
McAfee issued a new report that assesses organizations’ abilities to detect and deflect targeted attacks, reveals the top eight most critical indicators of attack, and …
SIEM doesn’t reduce security incidents, say IT pros
A survey of IT professional has shown that most organisations don’t audit their IT infrastructures and those that do don’t have complete details of who changed …
Exabeam announces user behavior security technology
Exabeam launched its platform, which adds a layer of user behavior intelligence on top of existing SIEM and log management repositories to give IT security teams a view of the …
Continuous monitoring for enterprise incident response
Qualys has further bolstered its Continuous Monitoring (CM) cloud service. The latest features include automated alerts for changes in perimeter IP addresses, as well as a new …
Identify stolen credentials to improve security intelligence
Data is the heart of an organization, and IT security teams are its protectors. Businesses spend billions of dollars per year setting up fortresses to safeguard data from …
ManageEngine fortifies enterprise security log analytics
ManageEngine announced the general availability of new features to its enterprise security log analytics portfolio. EventLog Analyzer, the security information and event …
Are organizations prepared for a data breach?
82% of IT professionals are either “concerned” or “very concerned” that their organization will face a security breach in the next year, according to …
Featured news
Resources
Don't miss
- CISA confirms exploitation of VMware ESXi flaw by ransomware attackers
- Why a decade-old EnCase driver still works as an EDR killer
- Smart glasses are back, privacy issues included
- Cybersecurity planning keeps moving toward whole-of-society models
- Major vulnerabilities found in Google Looker, putting self-hosted deployments at risk