Introducing Sumo Logic Cloud SIEM powered by AWS

The Sumo Logic team is pleased to introduce the general availability of Sumo Logic Cloud SIEM powered by AWS. This joint solution will empower CIOs, CISOs, security and IT leaders to solve modern and legacy security operations use cases for Enterprises of all sizes and maturity with deep and contextualized insights to reduce the time to detect and respond to threats.

3 Key Observations on Network and Security Transformation

Recently I attended another great Evanta CIO event, and in the course of a day packed with excellent talks and knowledge-sharing opportunities, I had the opportunity to sit down and discuss the topic of network and security transformation with Stuart Hughes, the CIDO at Rolls Royce. Stuart shared his experiences over the past 18 months, discussing how the pandemic—among other things—had changed his strategic approach to security.

3 Steps To Prevent Cyberthreats & Secure Your Company's Data

While data security has been an important topic since the internet’s inception, the issue is experiencing renewed prominence as platforms collect and struggle to secure copious amounts of personal information and prevent cyberthreats at the same time. The early 2000s were characterized by unprecedented growth and participation in the digital data economy, but the 2010s saw the creeping consequences of this ecosystem.

SANS 2020 MITRE ATT&CK

The Adversarial Tactics, Techniques & Common Knowledge (ATT&CK) project by MITRE is an initiative started in 2015 with the goal of providing a "globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. Since its inception, ATT&CK has taken the information security industry by storm. Many vendors and information security teams the world over have moved to adopt it with blinding speed-and for good reason: It is one of the most exciting, useful and needed efforts within InfoSec in recent memory.

Five Steps to a Modern Cyber Risk Management Team

A company-wide cybersecurity strategy is absolutely essential to combat today's evolving risk landscape. This means breaking down silos and encouraging the engagement of security experts throughout different business units. By leveraging collective understanding to expose unknown threats, you can amplify the effectiveness of your security program and technology stack. We call this "Modern Cyber Risk Management".

Largest Iran's Bank Allegedly Breached Exposing 47M Records Of The Customer

Recently, while performing a deep inspection of the dark web through Foresiet DigiRisk Platform, our Cyber Research and Support Team (FCRST) noticed, 33M records of Iran Bank were found breached and available. Our researcher has validated the data and it's very scary and has complete information including Account detail, card detail, PII information.

Data Loss vs. Data Leaks: What's the Difference?

Data loss refers to the unwanted removal of sensitive information either due to an information system error, or theft by cybercriminals. Data leaks are unauthorized exposures of sensitive information through vulnerabilities on the digital landscape. Data leaks are more complex to detect and remediate, they usually occur at the interface of critical systems, both internally and throughout the vendor network.