threat detection
Navigating Application Security in the AI Era
Nadav Czerninski | | AI, AI Co-pilot, AI Driven Attacks, AI models, AppSec, generative AI, threat detection, Vulnerability Management
Artificial intelligence (AI) and application security (AppSec) will only continue to intertwine further in the coming years ...
Security Boulevard
WhatDR or What Detection Domain Needs Its Own Tools?
Pondering ?DRThis is the blog where I really (briefly) miss my analyst life and my “awesome+” peers like Augusto and Anna. It relies on ideas and comments from my past collaborators … and my ...
Streamlining SAP Threat Detection and Response with Pathlock
SAP customers are encountering increasingly sophisticated internal and external security threats, particularly amid digital transformation initiatives. The complexity of system landscapes within SAP applications magnifies these challenges, exposing organizations to new vulnerabilities ...
Why Gurucul Is an Overall Leader in the 2024 KuppingerCole Leadership Compass for Intelligent SIEM
Blog Archives - Gurucul | | Analytics & Intelligence, Blog, SIEM, threat detection, Threat Intelligence
Learn why Gurucul was named an overall leader for intelligent SIEM in the 2024 KuppingerCole I-SIEM Leadership Compass. The post Why Gurucul Is an Overall Leader in the 2024 KuppingerCole Leadership Compass ...
Blueprint for Threat Intel to Detection Flow (Part 7)
This blog series was written jointly with Amine Besson, Principal Cyber Engineer, Behemoth CyberDefence and one more anonymous collaborator.In this blog (#7 in the series), we will cover more details on the ...
Ultimate Guide to Identity Threat Detection and Response (ITDR)
Blog Archives - Gurucul | | Analytics & Intelligence, Blog, cyberattack, Identity & Access Analytics, threat detection
Learn the fundamentals of what Identity Threat Detection and Response (ITDR) is, why it’s necessary and how to select the right ITDR solution. The post Ultimate Guide to Identity Threat Detection and ...
Harnessing the Power of Advanced AI to Optimize Security
Joe Ariganello | | AI, AI Cybersecurity, Blog, Cyber Threats, Cybersecurity using AI, generative AI, Real Time Threat Detection, Third Wave AI, threat detection, Threat Detection and Response
Organizations continue to face increasingly sophisticated cyber threats that require a proactive and adaptive approach to cybersecurity. As the volume and complexity of security data grows, security professionals are turning to advanced ...
Migrate Off That Old SIEM Already!
This is cross-posted from Google Cloud Community site, and written jointly with Dave Herrald.If you are like us, you may be surprised that, in 2024, traditional security information and event management (SIEM) systems ...
Why Human-Centric is the Hottest Trend in Cybersecurity
Human-centric security focuses on better management of the insiders that either inadvertently or maliciously cause threats that companies must deal with ...
Security Boulevard
Augmenting Legacy Controls with AI-driven Threat Detection and Response
Joe Ariganello | | Blog, identity threat detection and response, Real Time Threat Detection, threat detection, Threat Detection and Response, Threat Detection Investigation and Response, whitepaper
As organizations grapple with the limitations of legacy security controls in the face of increasingly sophisticated cyber threats, integrating AI-driven threat detection and response capabilities presents a compelling opportunity to bolster their ...