false positives - Tagged - Security Boulevard

What is Anomaly Detection in Cybersecurity?

Anomaly detection, the “identification of rare occurrences, items, or events of concern due to their differing characteristics from the majority of the processed data,” allows organizations to track “security errors, structural defects ...

Risks of Evidentiary Software

Over at Lawfare, Susan Landau has an excellent essay on the risks posed by software used to collect evidence (a Breathalyzer is probably the most obvious example). Bugs and vulnerabilities can lead ...
The Most Important Question to Ask Security Vendors Before Hiring Them

The Most Important Question to Ask Security Vendors Before Hiring Them

False positives remain a significant concern that affects your chances of closing a deal or making a sale. The post The Most Important Question to Ask Security Vendors Before Hiring Them appeared ...

A Modern SOC Should Not Be Entirely Dependent On Human Operators and Their Personal Experience

A modern SOC should not be entirely dependent on human operators and their personal experience. The issue has been a foundational problem with not only the methodologies used by SOCs for the ...

A Modern SOC Should Not Be Entirely Dependent On Human Operators and Their Personal Experience

A modern SOC should not be entirely dependent on human operators and their personal experience. The issue has been a foundational problem with not only the methodologies used by SOCs for the ...

Why Responding to a Cyber Attack with a Traditional SIEM Leaves You Vulnerable

An enterprise's inability to detect cyber attacks has tangible effects on its productivity and profitability. Various reports have noted a correlation between the time it takes to spot an intrusion and the ...

Why Responding to a Cyber Attack with a Traditional SIEM Leaves You Vulnerable

An enterprise's inability to detect cyber attacks has tangible effects on its productivity and profitability. Various reports have noted a correlation between the time it takes to spot an intrusion and the ...

Combat Alert Fatigue

Improve Productivity of Your SOC Personnel Through Menlo iSOC I get it—it’s been a hard year for the cybersecurity industry. Covid-19 pushed users from a safe, central, hardened data center out to ...
Whitepaper: The Failed Promises of SIEM

Whitepaper: The Failed Promises of SIEM

The fundamental SIEM flaws lie in the platform’s need for continual adjustment, endless data stores, and a tendency to create an overwhelming number of false positives. When organizations instead turn to a ...

3 Reasons Why a Rule-Based Cybersecurity Platform Will Always Fail

When it comes to advancements in cybersecurity, rule-based systems are holding the industry back. Relying on humans to constantly input and label rules in order to detect and stay ahead of threats ...