Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SIEM

The latest News and Information on Security Incident and Event Management.

Automating insider threat monitoring

From ingestion of relevant data sources to automation around threat monitoring, the security engineering team at Netskope utilizes Sumo Logic as a key tool in the protection of their intellectual property. Join this session to learn how something that began as an idea for an easy-to-use dashboards developed into a near completely automated process for data collection and correlation for investigating suspicious activity.
Trustwave

Trustwave Recognized in Gartner 2022 Market Guide for Managed SIEM Services

Trustwave, a leading provider of Managed Security Services, has been named a Representative Vendor in the Gartner® 2022 Market Guide for Managed SIEM Services. In the report, Gartner analysts Al Price, John Collins, Andrew Davies, Mitchell Schneider, and Angel Berrios provide an updated definition of Managed SIEM Services along with how Managed SIEM, which is also known as a managed SoC or SoC as a service.

devo

Devo SOARs to New Heights with LogicHub Acquisition

In cybersecurity, one thing is certain: the bad guys are relentless. They never stop working and scheming to find new ways to attack weaknesses in data security. Their objective is criminally simple: breach organizations to steal and monetize data. And they use every means possible to do it. On the other side are cybersecurity companies and the professionals who work for them. We never stop working to improve our products and services to protect our customers from those global threat actors.

Unboxing the SOC: Going from a SIEM to a comprehensive daily tool

See how you could take the initial steps of utilizing an out-of-the-box solution to the comprehensive SIEM tool that assists your SOC Team daily. Your organization could mirror Latitude’s journey with Sumo Logic and Cloud SIEM Enterprise. After watching this session, you’ll have insight into.

SIEM rule tuning to develop cyber situational awareness

Every organization runs at different levels of acceptable risk. When a SIEM rule generates an alert one company might deem it a critical risk while another will shrug it off as business as usual. Knowing how your organization runs and understanding your security posture can bring you improved cyber situational awareness.

CISO Challenges & opportunities in orchestrating the defense of the modern enterprise

Tune in to this lively panel dialogue with security industry thought leaders exploring how securing modern applications as a part of digital transformation is disrupting traditional security people, processes, and technology practices. Dave Frampton, VP/GM of the Security Business at Sumo Logic, will moderate a discussion with Yaron Levi, CISO of Dolby Labs, and Tyson Martin, Principal Security Advisor for AWS, on how CISOs can play both a good offense and defense to navigate this transition.
logsentinel

The Blockchain In Cybersecurity: Blockchain SIEM

It’s no secret that cybersecurity is one of the main challenges currently faced by our society. Hackers who got into government servers and private communication services have become a global threat. The blockchain could be a revolutionary technology in the fight against cyber threats, offering to protect databases and generally ensure integrity. Data protection is today’s top cybersecurity priority for any company.

sumologic

Find threats: Cloud credential theft on Windows endpoints

In today’s hybrid, multi-cloud environments, users and administrators connect to various cloud services using Command Line Interface (CLI) tools and web browsers. This post highlights the risks associated with unprotected and unmonitored cloud credentials which are found on endpoints, in file shares and in browser cookies. Get actionable and direct guidance around: In order to alert on and hunt for this malicious activity. Business workloads are increasingly undergoing a migration to the cloud.

elastic

Key to reducing cybersecurity risk: search-powered technology

Global survey shows cybersecurity was the top business priority for organizations that use tools that enable the search of data across multiple sources It’s time to re-evaluate how we define the term “search.” Today, search has far broader applications than those of a standard search engine query. That’s especially true when it comes to cybersecurity.