threat detection - Tagged - Security Boulevard
How to Make Threat Detection Better?

How to Make Threat Detection Better?

I keep coming to the same topic over and over — why are we still bad at detecting threats?I’ve lamented on this a few times, either touching on general difficulties with detection, its uncertainty ...

Improving Threat Detection Using LogRhythm SmartResponse with Lists to Monitor IOCs

As a security professional, you know all too well the need to continually improve your threat detection techniques and skill set. With today’s expanding attack surface and hackers becoming more sophisticated in ...
Webinar Recap: Why Your Legacy Cyber Platforms Can’t Defend Against Modern Day Attacks

Webinar Recap: Why Your Legacy Cyber Platforms Can’t Defend Against Modern Day Attacks

In partnership with Ravenii, our 60-minute talk was hosted by MixMode's Head of Sales and Alliances, Geoff Coulehan, CEO of Ravenii, Jeff Shipley, and MixMode’s CTO & Chief Scientist, Igor Mezic. They ...
MixMode Cyber Anomaly Detection Platform

New Video: MixMode Cyber Anomaly Detection Platform

We recently released a new video to better explain how MixMode’s next-generation cybersecurity anomaly detection platform combines the functionality of SIEM, NDR, NTA and UEBA for advanced threat detection, zero day attack ...

The Top 5 Considerations That Should Guide Your SOC Strategy in 2021 and Beyond

It’s evident that while organizations are spending more and more on legacy cybersecurity solutions, these platforms are not holding up their end of the deal and are not able to proactively defend ...
How to Close the Gaps in Your Security Investigations With Network Telemetry

Not the Final Answer on NDR in the Cloud …

Not the Final Answer on NDR in the Cloud …Back in my analyst years, I rather liked the concept of NDR or Network Detection and Response. And, despite having invented the acronym EDR, ...
SIEM Cannot Detect (and Ignores) Zero-Day Attacks

SIEM Cannot Detect (and Ignores) Zero-Day Attacks

Organizations are exclusively depending on selective information forwarded to the SIEM. The information that inevitably exists outside the system of record — information relevant for zero-day attacks — is ignored ...
What Are Your NOT Detecting?

What Are Your NOT Detecting?

What are you not detecting?OK, what threats are you NOT detecting?Still didn’t help?What I mean here is: are you thinking about these:Threats that you don’t need to detect due to your risk profile, your ...
threat Linux security XDR open source security

Leveraging Managed Threat Hunting

The cybersecurity landscape changed drastically on two fronts in 2020: volume and supply chain complexities. Attack surfaces expanded and softened as employees migrated off well-protected corporate networks and logged on from home ...
Security Boulevard
Performing Critical Cyber Diligence for Mergers and Acquisitions Using MixMode

Performing Critical Cyber Diligence for Mergers and Acquisitions Using MixMode

According to a recent M&A trends survey conducted by Deloitte, 51 percent of 1,000 Executives responsible for Mergers and Acquisitions (M&A) at U.S. companies and private-equity investor firms listed cybersecurity threats as ...