Graph

Time Series Databases, the Future of Monitoring and Logging

The post Time Series Databases, the Future of Monitoring and Logging appeared first on CCSI ...

RSA Labs Project Iris: Edge Monitoring and Analytics for IoT

While IoT is core to digital transformation the proliferation of endpoints creates a strain on effective operational security. . . With Project Iris, RSA Labs data scientists explore new methods and algorithms ...
🙂

Should You Buy a Piece of SIEM?

We lament that people love to buy single-purpose security tools and then complain about it, but what about buying components of tools? For example, will you buy a normalization engine so that ...

Secure The Wrong Path or Change The Path?

How do I configure a firewall appliance in public IaaS? How do I install anti-virus inside a container? How do I filter calls to microservices via an appliance in my DMZ? Now, ...
🙂

Migrating from Your SIEM to a New One

Many years ago, in 2011, I wrote this blog post on SIEM migration, called “How to Replace a SIEM?” I was a consultant at that time and I helped some organizations to ...
🙂

Rule Based Detection?

One of the famous insults that security vendors use against competitors nowadays is “RULE – BASED.” In essence, if you want to insult your peers who, in your estimation, don’t spout “AI” ...
🙂

Psychoanalyzing Security Cloud Fears

Here is a funny one: why so many security professionals (and leaders) still hate the cloud? OK, OK, I get it, many of you want to respond to this with a WHAT ...
:-)

Webinar Q&A from Modern Network Threat Detection and Response

As promised, here is my lightly edited Q&A from a recent webinar called “Modern Network Threat Detection and Response.” Questions about vendors are removed, and some are edited for clarity. Q: I ...
Untold Number of Discover Card Account Holders Notified of Data Breach

Untold Number of Discover Card Account Holders Notified of Data Breach

An undisclosed number of Discover card account holders have learned of a data breach that might have compromised their account information. According to Bleeping Computer, Discover Financial Services first learned of the ...
SP-2019-366328 0001

Our “Solution Path for Implementing Threat Detection and Incident Response” Publishes

As you can see below, we have written a lot of research over the years, and it would be handy to have a roadmap for the readers. This is especially useful for ...
Loading...