Security Analytics

Analytics and Intelligence

Tendencias TI para el 2021: así será la nueva normalidad

Tendencias TI para el 2021: así será la nueva normalidad

  El 2020 en definitiva obligó a organizaciones a dar un giro de 180 grados a la forma en que estaban establecidas las rutinas de trabajo y reafirmó lo fundamental que es ...
Thundra Logo Z

The difference between Monitoring and Observability

Legacy methods based on handling predictable failures often do not work well while monitoring modern distributed applications. Efficient debugging and diagnostics require that the system be observable with a microservice architecture now ...

Featured Use Case: Why a Large US Utility Company Turned to MixMode to Address Utility Grid Vulnerabilities

A large utility company approached MixMode with the following scenario: The enterprise SOC was utilizing a shared SIEM application that was being utilized by several stakeholders: the networking team, the SCADA team, ...

Moving from Threat Hunting to Threat Catching

The goal of a Threat Hunter is to find an attacker in the middle of an attack before they can cause damage. This entails hunting through thousands of requests trying to pick ...
Register Now Button

Security Analytics and SIEM Best Practices

SIEM (Security Information and Event Management) and AI-Based Security Analytics is something of a match... The post Security Analytics and SIEM Best Practices appeared first on Gurucul ...
CIA

Second Swiss Firm Said to Be CIA Encryption Puppet

First Crypto AG, and now Omnisec AG: Sources say second Swiss company was also in the pocket of the CIA ...
Security Boulevard
Google

Google Finally Pulls Chinese Apps Stealing Personal Data

After six million downloads, two spyware Baidu apps have been removed from the Play Store. What took Google so long? ...
Security Boulevard
FireEye

FireEye Acquires Respond Software to Advance Cybersecurity AI

FireEye Inc., a provider of managed security services augmented by machine learning algorithms, has acquired Respond Software, a provider of a platform that automates security incident investigations, for $186 million. Peter Bailey, ...
Security Boulevard
5 padrões de comportamento do usuário que devemos prestar atenção em um espaço de trabalho descentralizado

5 padrões de comportamento do usuário que devemos prestar atenção em um espaço de trabalho descentralizado

Problema: Se você possui milhares de funcionários espalhados por vários de lugares, como pode manter a rede da sua organização segura? Solução: Você deve monitorar seus funcionários onde quer que estejam e desenvolver uma ...
Introducing the Cloud Sensor for GCP

Introducing the Cloud Sensor for GCP

By Vijit Nair, Sr. Director, Product Management, Corelight Visibility is paramount in securing your cloud environment – as the adage goes, you cannot protect what you do not see. However, comprehensive visibility ...