threat detection
The Critical Role of Network Detection and Response in Improving Enterprise Security [Q&A with Vito Rallo of PwC]
Vito Rallo is Director of Cyber Incident and Threat Management at PwC. He and his team provide offensive security and incident and threat management services to medium and large enterprises. Prior to ...
Recent Ransomware Attacks on U.S. Hospitals Highlight the Inefficiency of Rules-Based Cybersecurity Solutions
A number of recent high profile ransomware attacks on U.S. hospitals have demonstrated the urgency for organizations, municipalities, and critical services to take a proactive approach to protecting networks with a predictive ...
Insider Threat Case Studies: Why You Need Advanced Behavior Analytics
We’ve talked a lot about Insider Threats. They are a Big Deal™ and deserve the... The post Insider Threat Case Studies: Why You Need Advanced Behavior Analytics appeared first on Gurucul ...
How Better Network Instrumentation Eliminates Security Risks – Q&A with Chief Product Officer Andre Ludwig
Today we’re discussing network instrumentation with Bricata Chief Product Officer Andre Ludwig. Our interview covers why instrumentation is needed, the state of network instrumentation in most enterprises today, the risks of not ...
On Threat Detection Uncertainty
My post “Why is Threat Detection Hard?” proved to be one of the most popular in recent history of my new blog. In this post, I wanted to explore a seemingly obvious, ...
Protect Your Employees from Business Email Compromise Attacks
Menlo Imposter Threat Detection Flags Payloadless Attacks that Impersonate Senior Executives and Other VIPs Cyberattacks aren’t always delivered via a payload such as a link to a malicious URL or an infected ...
Webinar Recap: The Failed Promises of SIEM
MixMode teamed up with Ravenii to host a webinar focused on the history and evolution of SIEM platforms, their ideal role in a SOC today, and how they fall short as a ...
Monitoring and Vulnerability Management
(Cross posted from the Securonix Blog)Vulnerability management is one of the most basic security hygiene practices organizations must have in place to avoid being hacked. However, even being a primary security control ...
Why is Threat Detection Hard?
While creating a recent presentation, I needed a slide on “threat detection is hard.” And it got me thinking, why is threat detection so hard for so many organizations today? We can ...
Chronicle Detect is Here
A lot of people ask me how Chronicle is doing inside Google Cloud (TLDR: doing well), and I wanted to share some good news. I also wanted to reveal some of our ...

