Security Analytics

Analytics and Intelligence

[Webinar Replay] Opportunities in SIEM Analytics

[Webinar Replay] Opportunities in SIEM Analytics

Security information and event management (SIEM) is an approach to security management that combines SIM (security information management) and SEM (security event management) functions into one security management platform. SIEM tools aggregate ...
Privacy Policies: The Realm Of The Legible Word Salad by Chris Boyd

Exploring the virtual worlds of advergaming

With a spot of tracking-related controversy ruffling feathers in gaming circles, now is a good time to become familiar with some of the advertising methods used for, and in, video games. Ladies ...
The Must-Have SIEM Features for Advanced Threats

The Must-Have SIEM Features for Advanced Threats

Investing in a SIEM solution is an important step in protecting your organization from advanced threats. However, selecting a SIEM vendor can be a challenge unless you know what questions to ask ...
Further sharing of signals across the Intelligent Security Graph

Enhancing Office 365 Advanced Threat Protection with detonation-based heuristics and machine learning

Email, coupled with reliable social engineering techniques, continues to be one of the primary entry points for credential phishing, targeted attacks, and commodity malware like ransomware and, increasingly in the last few ...
Early in the Kill Chain

Detecting Bad Actors Early in the Kill Chain

Disrupting the kill chain before attackers reach their goal Cybersecurity borrows a lot of terms and tactics from the military, and kill chain is one such term used to describe the steps ...
Security Boulevard
Inner Circle Podcast: Episode 007 – Daniel Miessler Demystifies Machine Learning

Inner Circle Podcast: Episode 007 – Daniel Miessler Demystifies Machine Learning

My guest for this episode of the Inner Circle podcast is Daniel Miessler, Director of Advisory Services for IOActive. Daniel presented a session at IOAsis a few weeks ago while we were ...

The AI’ker’s Guide to the (cybersecurity) Galaxy

As a security veteran, I find myself from time to time having to explain to newbies the importance of adopting a ‘hacker’s way of thinking’, and the difference between hacker’s thinking and ...
Ask These Questions When Evaluating SIEM Solutions

Ask These Questions When Evaluating SIEM Solutions

Modern IT infrastructure generates a wealth of data. A large or mid-size enterprise can generate petabytes and, in some cases, even exabytes of log and metadata. Hackers know this and intentionally target ...
Loading...