Rethinking Identity Threat Detection: Don’t Rely on IP Geolocation

Rethinking Identity Threat Detection: Don’t Rely on IP Geolocation

SOC teams frequently look to the IP geolocation to determine whether an alert or activity poses a genuine threat.  However, with the changing threat landscape, relying solely on this information is no ...
logging IP value data

4 Ways IP Data Can Help Fight Cybercrime

Cybercrime is going up, not down, every year, despite the tens of billions of dollars companies invest in shoring up their information infrastructure. According to the Identity Theft Resource Center, 2021 was ...
Security Boulevard
Russia privacy privacy social media

Want To Protect Privacy? Get Off Social Media, Indiana Federal Court Says

Privacy issues surrounding social media abound, including what’s considered ‘content’ privacy and ‘non-content’ privacy When the government wants to get data about you from someone other than you (a third party), does ...
Security Boulevard

Corelight ECS Mapping: Unified Zeek data for more efficient analytics

By Ed Smith, Senior Product Marketing Manager, Corelight In addition to other great news we’ve recently shared, I’m pleased to announce that Corelight sensors now support the Elastic Common Schema (ECS) via ...
logging IP value data

Is it Unlawful to Collect or Store TCP/IP Log Data for Security Purposes?

It is a common and accepted practice for entities to collect, store, process and analyze log data. This log data includes the IP addresses of every person (computer) that accessed or attempted ...
Security Boulevard