Security Analytics

Analytics and Intelligence

business risk

IBM Launches Security Assessment Service Focused on Business Risk

IBM Security this week launched a service through which it will work with IT security professionals to assess the business risks cybersecurity vulnerabilities represent. Julian Meyrick, vice president for IBM Security, said ...
Security Boulevard

3 Reasons Why a Rule-Based Cybersecurity Platform Will Always Fail

When it comes to advancements in cybersecurity, rule-based systems are holding the industry back. Relying on humans to constantly input and label rules in order to detect and stay ahead of threats ...
DDLC - Detection Development Life Cycle

DDLC – Detection Development Life Cycle

| | SIEM, threat detection
Dr. Chuvakin has recently delivered another great blog post about "detection as code". I was glad to read it because it was the typical discussion we used have in our brainstorming conversations ...
Can We Have “Detection as Code”?

Can We Have “Detection as Code”?

One more idea that has been bugging me for years is an idea of “detection as code.” Why is it bugging me and why should anybody else care?First, is “detection as code” just ...
Why Data Overload Happens and Why It Is a Problem for Cybersecurity Teams

Why Data Overload Happens and Why It Is a Problem for Cybersecurity Teams

Handling and managing data today has become unwieldy for IT teams on multiple fronts, but the security impact is especially troubling ...

Why following NIST guidelines will strengthen your SIEM framework

The National Institute of Standards and Technology (NIST) is a federal, non-regulatory agency funded by the United States Department of Commerce. It aims to provide security guidelines, quality standards, and more for ...
extortion

IT’s Confidence in Mitigating Cyberthreats Low

As cyberthreats evolve and increase in both voracity and velocity, many IT professionals are becoming increasingly worried about their organization’s ability to deal with those threats. That’s according to the results of ...
Security Boulevard
BlindSide

BlindSide: Intel/AMD Speculation Bugs Under Microscope Again

Researchers have published frightening details on what they’re calling BlindSide, which relies on co-opting our old friend speculative execution ...
Security Boulevard

Why SIEM Has Failed the Cybersecurity Industry

The time required for data processing, transition, aggregation, and the normalization does not allow real-time threat detection using today's SIEM solutions. The only beneficiary of security through log aggregation is the SIEM ...

Using Access Controls to Thwart Insider Threats

Almost half of our Top 10 list for Insider Threats have some reference to access... The post Using Access Controls to Thwart Insider Threats appeared first on Gurucul ...