Security Analytics

Analytics and Intelligence

McAfee to Advance Cybersecurity AI via the Cloud

McAfee to Advance Cybersecurity AI via the Cloud

McAfee this week announced the availability of McAfee ePolicy Orchestrator (ePO) software on Amazon Web Services (AWS), which sets the stage of applying artificial intelligence (AI) to the massive amounts of data ...
Security Boulevard

SOAR-native SOC, Can This Work?

| | Monitoring, security, SOAR, SOC
This post is part of our current SOC research, but it also touches on our past SOAR research. Here is the thing: when we looked at SOAR technology, we mostly saw more ...

Identity & Access Management, GRC, SIEM: Tackling Identity Risk as One

Managing identity risk starts with a strong identity and access management system?but it doesn?t end there. Truly effective identity risk management requires identity and access management, GRC and SIEM systems all working ...

Identity & Access Managements, GRC, SIEM: Tackling Identity Risk as One

Managing identity risk starts with a strong identity and access management system?but it doesn?t end there. Truly effective identity risk management requires identity and access management, GRC and SIEM systems all working ...

How to Receive a Clean SOC 2 Report

Controls—SOC 2 is all about controls. It’s right there in the name: Service Organization Controls, S-O-C. A SOC 2 report is a de facto requirement for any organization that wants to store ...
SolarWinds Acquires Trusted Metrics

SolarWinds Acquires Trusted Metrics

SolarWinds moved to expand its portfolio of security technologies by acquiring Trusted Metrics, a provider of real-time threat monitoring and management software. SolarWinds immediately then launched SolarWinds Threat Monitor, a tool for ...
Security Boulevard
Malicious PowerShell Detection via Machine Learning

Malicious PowerShell Detection via Machine Learning

Introduction Cyber security vendors and researchers have reported for years how PowerShell is being used by cyber threat actors to install backdoors, execute malicious code, and otherwise achieve their objectives within enterprises ...

Watch the (Privileged) Watcher

How do you help your SOC deal with internal attacks? Leveraging a big data-driven, user and entity behavior analytics solution (UEBA), security analysts can reduce mean-time-to-detection (MTTD) and extend its detection outreach ...

What Is “SIEM+” Or “Can We Have A Cyber Defense Platform?”

Contrary to what some “analytics” or “AI” vendors will have us believe, SIEM in 2018 is not the SIEM of our grandfathers. In 2002, when I was first initiated into the dark ...
  via   the comic content delivery system known as    Randal Munroe   at    XKCD   !

XKCD, New Phone Thread

via the comic content delivery system known as Randal Munroe at XKCD! ...
Loading...