false positives
Combat Alert Fatigue
Improve Productivity of Your SOC Personnel Through Menlo iSOC I get it—it’s been a hard year for the cybersecurity industry. Covid-19 pushed users from a safe, central, hardened data center out to ...
Whitepaper: The Failed Promises of SIEM
The fundamental SIEM flaws lie in the platform’s need for continual adjustment, endless data stores, and a tendency to create an overwhelming number of false positives. When organizations instead turn to a ...
3 Reasons Why a Rule-Based Cybersecurity Platform Will Always Fail
When it comes to advancements in cybersecurity, rule-based systems are holding the industry back. Relying on humans to constantly input and label rules in order to detect and stay ahead of threats ...
Magnify Podcast: Discussing the New Normal with AI Based Cybersecurity Specialists, MixMode
Geoff Coulehan, MixMode’s Head of Strategic Alliances, joined Secrutiny’s “Magnify Podcast,” to discuss the priorities CISOs should focus on to better protect their now-remote team of employees ...
4 Challenges of Stand-Alone SIEM Platforms
While SIEM is undoubtedly a step up from unmonitored network environments, the inherent nature of today’s SIEM software often falls short in several important ways. SIEM is an outdated solution for adequately ...
How the Role of the Modern Security Analyst is Changing
As organizations began to rely more heavily on networking to carry out their operations over the past decade, IT teams added security analyst positions. These professionals focused on network security and providing ...
The Cybersecurity Processes Most Vulnerable to Human Error
The world's reliance on fast, reliable, secure networks has likely never been as apparent as it became in early 2020, when the world responded to the Coronavirus pandemic. Suddenly, vast swaths of ...
How to eliminate false positives in file integrity monitoring on WordPress
File integrity monitoring (FIM) allows you to quickly detect file changes on your WordPress site. It is an important part of securing a WordPress site and the way it works is very ...
What’s New and Changing in the World of Vulnerability Management?
According to CIS, “Organizations that do not scan for vulnerabilities and proactively address discovered flaws face a significant likelihood of having their computer systems compromised.” While vulnerability management (VM) isn’t new, I’ve ...
Threat Forwarding Augments Threat Intelligence with Automated Triage and Categorization
Bromium customers have long had the option to securely transmit their proprietary threat data to Bromium analysts either manually or using our one-way Cloud Connector. Now, with Bromium Secure Platform 4.1.5, we've ...

