threat response
AI’s Role in Cybersecurity for Attackers and Defenders in 2024
Matt Wiseman | | AI, Artificial Intelligence, Authentication, Cybersecurity, Data Privacy, executive order, Phishing, threat detection, threat response, Vulnerability Management
As AI becomes available and robust, malicious actors have already used it to develop more advanced attack methods; defenders must also leverage AI in 2024 ...
Security Boulevard
XDR vs. SIEM vs. SOAR: A Vendor-Agnostic Perspective
Shriram Sharma | | Analytics & Intelligence, and Response, Automation, cyber defense, Cybersecurity, Extended Detection and Response, Gartner, Security Information and Event Management, security orchestration, SIEM, SOAR, threat detection, threat response, XDR
For modern SOC teams, detection and response is a big data problem. Effective cyber defense hinges on collecting, analyzing, and acting on massive troves of security-relevant data. This is where tools like ...
The More Cybersecurity Changes, the More It Stays the Same
Neill Sciarrone | | Cybersecurity, cybersecurity tools, evolution of cybersecurity, Incident Response, threat response
It is time for an evolution in cybersecurity that focuses on adversary disruption Despite major advancements in technology, the global approach to cybersecurity has remained the same for decades: Respond and recover ...
Security Boulevard
Cloud Adoption Cited as Top Initiative in Workforce Transformation
RSA Blog | | Authentication, Cybersecurity, Digital Risk, Digital Risk Management, Digital Transformation, Dynamic Workforce Risk, Identity & Access Management, Identity Management and Governance, threat detection, threat response, Workforce Trends
Digital transformation is changing the global workforce, from how we work to where we work from. Organizations are investing in new digital technology to address the impacts of globalization, demographics, work styles ...
New Data Privacy Regulation Deadline Spawns Phishing Attack Outbreak
Heidi Bleau | | Compliance, Cyber Crime, Fraud, GDPR, Malware, Phishing, threat detection, Threat Detection and Response, threat response
The use of trendy stories or pressing compliance deadlines to launch attacks is nothing new to cyber criminals. While phishing attacks cause pain for consumers, the implications on the corporate side are ...
Don’t be an asymptote! Understanding the cost of delayed threat response
Figure 1 - Example of asymptote of a function approaching infinity It should be the unwritten rule of cybersecurity: Don’t make an asymptote of yourself or your team members. As you may ...
Don’t be an asymptote! Understanding the cost of delayed threat response
Figure 1 - Example of asymptote of a function approaching infinity It should be the unwritten rule of cybersecurity: Don’t make an asymptote of yourself or your team members. As you may ...