NTA: The Other IDS?

| | analytics, network, NTA, security
Have you ever wondered why academic literature – however silly much of infosec academic research is – always talks about “signature-based IDS” (“misuse”) and “anomaly-based IDS” (“abuse”), but most industry people instantly ...

More on Security Data Lakes – And FAIL!

| | analytics, big data, security
Naturally, all of you have read my famous “Why Your Security Data Lake Project Will FAIL!” [note: Anton’s ego wrote this line :-)] Today I read a great Gartner note on data ...

What Is “SIEM+” Or “Can We Have A Cyber Defense Platform?”

Contrary to what some “analytics” or “AI” vendors will have us believe, SIEM in 2018 is not the SIEM of our grandfathers. In 2002, when I was first initiated into the dark ...
Privacy Policies: The Realm Of The Legible Word Salad by Chris Boyd

Exploring the virtual worlds of advergaming

With a spot of tracking-related controversy ruffling feathers in gaming circles, now is a good time to become familiar with some of the advertising methods used for, and in, video games. Ladies ...

“Do They Have AI?” or That Rant on AI in Security

This post is inspired by a few painful discussions on artificial intelligence (AI) that I had both in public (on Twitter) and internally too. Let’s start with a joke: Q: How do ...

Create a Team for Audit Analytics? Part 3

In the previous post, Create a Team for Audit Analytics? Part 2, I explored the pros and cons of expecting all auditors to develop a level of data and analytic proficiency. These ...

Create a Team for Audit Analytics? Part 2

In the previous post, Create a Team for Audit Analytics? Part 1, I explored the pros and cons of developing an analytics team. This team consists of analytic auditors who are dedicated ...
Splunk to Dive Deeper into Cybersecurity with Phantom Buy

Splunk to Dive Deeper into Cybersecurity with Phantom Buy

For a long time now Splunk has been content to essentially offer up cybersecurity advice made possible by applying analytics to machine data captured within the logs of various systems. That information ...
Security Boulevard

Create a Team for Audit Analytics? Part 1

Once your audit team has proven the value of doing analytics consistently, the next question is: Do we create an analytics team and have the team do all (or the majority) of ...
Loading...