Sep 19, 2023
|
By Christopher Beier and Anton Ovrutsky
For many years, hackers and cybercriminals have used social engineering techniques to gain unauthorized access to confidential information. It is easy to predict that these attacks will continue to advance in sophistication and frequency. Whether they are using AI to create better lures or cyber criminals are just getting more adept at exploiting human nature, the success of these attacks proves the tactics are winning.
Sep 12, 2023
|
By Peter Kazmir
Playbooks — and automated processes in general — used to be associated primarily with security orchestration, automation and response (SOAR) platforms, but that has changed recently. Many modern security information and event management (SIEM) solutions have started incorporating SOAR-like functionality, enabling you to automate security workflows and improve your mean time to detect (MTTD) and mean time to respond (MTTR).
Aug 30, 2023
|
By JT Rakitan
What to expect when you’re expecting a cybersecurity audit for compliance A cybersecurity audit is a structured evaluation or assessment conducted to determine an organization's level of compliance with relevant cybersecurity regulations, industry standards and internal policies. Read on to learn what an audit is looking for, the challenges of an audit, how to prepare for one, and the tools that can help your organization get ready.
Aug 24, 2023
|
By Christopher Beier and Janet Alexander
Even the mightiest, most prestigious companies and enterprises are not exempt from the advanced threats of cyber attackers. In the ever-evolving cybersecurity threat landscape, an organization's security team like yours needs robust security measures for network security, endpoint security, threat detection, anomaly detection, data protection, security monitoring, application security and information security.
Aug 17, 2023
|
By Anton Ovrutsky
Consider the following scenario: you are asked by your leadership to find dedicated time for threat hunting activities within your network. After some time, access to the shiny new tool of choice is granted and you are super excited to get started. You log into the tool and are greeted with a lovely search bar; how do you proceed from here? The tool presenting the blank search bar is undoubtedly powerful and feature packed.
Aug 8, 2023
|
By Janet Alexander
So, you want to be a cybersecurity analyst. You’ll be pleased to know it’s a profession with a strong job outlook, thanks to the increasing importance of cybersecurity. With the rise in high-profile data breaches, privacy concerns and rapid technological advancements, there is a greater demand for cybersecurity analysts now than ever.
Jul 31, 2023
|
By Dana Torgersen
The U.S. Securities and Exchange Commission (SEC) announced new regulations for public companies requiring them to disclose a “material cybersecurity incident” via formal report due four business days after a company determines that a cybersecurity incident is material. This is creating a lot of buzz, with companies worried if they will be prepared.
Jul 18, 2023
|
By Chas Clawson
Within the security community of late, the focus has been on “shifting left”, and while that has merit, it is somewhat myopic missing some of the realities of defense in practice. Instead, I propose a simple framework to help guide initiatives that will “level up” defenses and greatly improve security postures wholistically. Some license is taken in terminology in order to keep things simple, memorable, and applicable.
Jun 26, 2023
|
By Anton Ovrutsky
For those responsible directly or indirectly for the cyber defense of their organizations, June 2023 is proving to be an extremely challenging month. In this month alone, vulnerabilities were discovered in various appliances, ranging from CVE-2023-27997 impacting FortiGate devices to CVE-2023-35708 impacting MOVEit Transfer software as well as the exploitation activity discovered of Barracuda appliances via CVE-2023-2868.
Jun 20, 2023
|
By Dana Torgersen
The financial outlook for the rest of 2023 and 2024 is far from cheery, and economic uncertainty is affecting everyone and everything, including the cybersecurity sector. Security budget cuts or freezes are the course many organizations are tempted to take in this financially precarious situation. Conservative spending is a natural response to the present economic downturn and a possible recession knocking on our doors, implying fewer clients, lower profits, and higher costs.
Sep 20, 2023
|
By Sumo Logic
Please join us as Peter teaches us about Sumo Logic's UEBA in Cloud SIEM Enterprise!
Sep 19, 2023
|
By Sumo Logic
Join this webinar with Sumo Logic and SANS to learn: What impact do human targets have on cybersecurity Why solving the human problem may ultimately be a technology problem Where AI/ML technologies can help security teams better understand human behaviors and protect the enterprise.
Sep 14, 2023
|
By Sumo Logic
In this video, we’ll show you some best practices for configuring and troubleshooting data set collection into Cloud SIEM using Sumo Logic parsers.
Aug 18, 2023
|
By Sumo Logic
In this session, David and Peter walk us through Sumo's new MITRE ATT&CK Coverage Explorer.
Jul 25, 2023
|
By Sumo Logic
In this session, Anton covers threat hunting/threat detection with Sumo Logic's Cloud SIEM Enterprise and Cloud Security Analytics.
Jul 17, 2023
|
By Sumo Logic
Learn about the App Central page for installing and managing integrations into Cloud SIEM Automation Service.
Jun 29, 2023
|
By Sumo Logic
Learn about using Cloud SIEM to define and automate smart actions, including enrichments and notifications, to quickly investigate, understand, and react to potential security threats.
Jun 23, 2023
|
By Sumo Logic
In this session, Lukasz covers rule tuning in Sumo Logic's Cloud SIEM Enterprise.
Nov 8, 2018
|
By Sumo Logic
Security information and event management (SIEM) solutions have been around since 2000, and they were developed with the goal of helping organizations in the early detection of targeted attacks and data breaches.
Nov 1, 2018
|
By Sumo Logic
SIEM stands for Security Information and Event Management and these solutions have been around since 2000. They were developed with the goal of helping organizations in the early detection of targeted attacks and data breaches.
Oct 1, 2018
|
By Sumo Logic
In this paper we will discuss some of the general philosophies and perspectives that will assist anyone who wants to securely leverage the benefits the cloud by using its strengths to overcome issues that have traditionally been labeled as weaknesses.
Jul 1, 2018
|
By Sumo Logic
This white paper describes the technologies and processes used by Sumo Logic to secure customer data, and provides background on the company's deeply ingrained security culture.
Jun 1, 2018
|
By Sumo Logic
This white paper is intended to support stakeholders movement of applications to the cloud, and provide some fundamental approaches to adopt in order to better protect every layer of the AWS infrastructure.
- September 2023 (5)
- August 2023 (6)
- July 2023 (5)
- June 2023 (5)
- May 2023 (14)
- April 2023 (6)
- March 2023 (2)
- February 2023 (3)
- January 2023 (3)
- December 2022 (5)
- November 2022 (5)
- October 2022 (3)
- September 2022 (13)
- August 2022 (1)
- July 2022 (3)
- June 2022 (5)
- May 2022 (2)
- April 2022 (4)
- March 2022 (5)
- February 2022 (3)
- January 2022 (5)
- December 2021 (5)
- November 2021 (4)
- October 2021 (8)
- September 2021 (18)
- August 2021 (14)
- July 2021 (11)
- June 2021 (6)
- May 2021 (3)
- April 2021 (2)
- March 2021 (3)
- February 2021 (2)
- January 2021 (5)
- December 2020 (8)
- November 2020 (2)
- October 2020 (4)
- September 2020 (1)
- August 2020 (1)
- July 2020 (8)
- June 2020 (7)
- May 2020 (7)
- April 2020 (4)
- March 2020 (6)
- February 2020 (5)
- January 2020 (2)
- December 2019 (2)
- November 2019 (1)
- October 2019 (7)
- September 2019 (6)
- August 2019 (6)
- July 2019 (4)
- June 2019 (5)
- May 2019 (2)
- April 2019 (2)
- March 2019 (4)
- February 2019 (3)
- January 2019 (2)
- November 2018 (2)
- October 2018 (1)
- July 2018 (1)
- June 2018 (1)
Empowering the People Who Power Modern Business. A Cloud-native Machine Data Analytics Platform for DevSecOps.
Sumo Logic is a secure, cloud-native, machine data analytics service, delivering real-time, continuous intelligence from structured, semi-structured and unstructured data across the entire application lifecycle and stack.
Build, run and secure your AWS, Azure, Google Cloud Platform or Hybrid applications with Sumo Logic, a cloud-native, machine data analytics service for log management and time series metrics.
- Optimize Continuous Delivery: Accelerate development, testing, & deployment of your application.
- Monitor & Troubleshoot in Real Time: Enable DevOps to proactively identify and fix performance issues.
- Secure Your Platform: Detect, investigate and respond to security issues instantly.
- Simplify Compliance Management: Ensure compliance with HIPAA, PCI, GDPR and much more.
One platform for real-time, Continuous Intelligence.