Security News

Despite more than a few decades’ worth of technological advancement and millions of dollars’ worth of research, cyber threats continue to flourish. The situation has been wreaking havoc—and...

On average, security personnel in U.S. enterprises waste approximately 25 percent of their time chasing false positives because security alerts or indicators of compromise (IOCs) are erroneous, a...

The success of security operations centers will depend on how well they blend key technologies - including detection, user behavior analytics and orchestration, says Haiyan Song of Splunk, who...

Enterprise digital transformation efforts combined with advanced and innovative cybersecurity attacks have left many organizations’ security operations teams overwhelmed by an inordinately high...

This may be cheesy, and half of you reading this may not have been alive at the time to remember, but President Ronald Reagan’s appeal more than 30 years ago to “tear down this wall” is advice...

Over the past ten years, I have led and supported incident response engagements across nearly every industry vertical and trained security teams of all sizes to develop and improve their detection...

In today's business environment, data is what matters most. It matters to organizations that monetize it into operational insights and optimisations, and it matters the threat actors that...

Stephen Moore of Exabeam Outlines Key Security Operations Center ChallengesManaging a security operations center is fraught with challenges, says Stephen Moore of Exabeam, who outlines the...

OT Environments Need Security Monitoring that Provides Enhanced Visibility and Traceability Into OT Systems read more

As a threat researcher, I’ve advised security teams of organizations big and small, across both public and private sectors. So after a decade in DFIR, people often ask me about the craziest or...