Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SIEM

The latest News and Information on Security Incident and Event Management.

Find threats: Cloud credential theft on Windows endpoints

In today’s hybrid, multi-cloud environments, users and administrators connect to various cloud services using Command Line Interface (CLI) tools and web browsers. This post highlights the risks associated with unprotected and unmonitored cloud credentials which are found on endpoints, in file shares and in browser cookies. Get actionable and direct guidance around: In order to alert on and hunt for this malicious activity. Business workloads are increasingly undergoing a migration to the cloud.

Key to reducing cybersecurity risk: search-powered technology

Global survey shows cybersecurity was the top business priority for organizations that use tools that enable the search of data across multiple sources It’s time to re-evaluate how we define the term “search.” Today, search has far broader applications than those of a standard search engine query. That’s especially true when it comes to cybersecurity.

Enhance Your Security Operations with SciSec Activeboards

With the overwhelming amounts of data, security teams need dynamic, real-time visualization capabilities to quickly make sense of the data they need to manage so they can take action where needed and convey the status of their security posture. Devo makes these objectives easy to accomplish using Activeboards.

Elastic provides the foundation for the DoD's pillars of Zero Trust Networking

The whole point of IT systems, whether deployed via traditional methods or via modern practices (such as Agile methodologies, DevSecOps, and orchestration platforms like Kubernetes) is to make data available for business operations — whether those operations are making business decisions, identifying or troubleshooting system performance and efficiency issues, detecting bad actors, or protecting organizational assets.

What are Elastic Security capabilities in the cloud - and how do they drive results?

Cloud-based SIEM, long a forward-looking topic, is here and now. In fact, advanced organizations will spend 27% more on cloud cybersecurity as a percentage of IT spending in 2022 vs. 2021 as they expand their use of cloud providers, services, and integrations with other technologies. There are a myriad of benefits to conducting security operations on a cloud-based platform.

Why CISOs are the new champions of insurance transformation

The insurance industry's business model is rapidly evolving as the latest consumer and business technologies deliver greater quantities of real-time data than ever before. McKinsey predicts that by 2030, processes like underwriting as we know it will cease to exist — machine and deep learning models will automate policies and reduce delivery time to seconds.

Defense Department's Multi-Cloud Cloud Strategy: A Role for SIEM

It’s difficult to recall a time over the last ten years when cloud requirements were not at the forefront of the Defense Department’s modernization efforts. Cloud capability reviews and requirements, in some form, extend from the Pentagon’s net-centricy efforts — to the Joint Information Environment, Digital Modernization, and up through to today.

CTO-Talk: Defense Artifacts for Zero-Trust Security

Based on blockchain technology, LogSentinel designs and implements a zero-trust security system that stores data on-chain, uploads local log files to the blockchain for storage, and provides a visual interface for users to use security analysis functions. The system can provide safe and reliable storage of security device logs and at the same time provide convenience for log analysis and log forensics. LogSentinel solves the problems associated with easy-to-delete, tamper, and falsifying log files.

Security use cases: The key to test the readiness of your SIEM solution

Organizations have started considering cybersecurity as a top priority lately. The amount of money invested in IT infrastructure is increasing at an exponential rate. Further, dedicated teams are formed to monitor and optimize the performance of the different solutions that each organization has in its environment. Similarly, when it comes to cybersecurity, it’s become essential to evaluate and quantify the security posture of every organization.

The secret is out: Why Open Security is key to preventing cyber threats

For decades, the cybersecurity industry has been shrouded in secrecy. This is partly because of the misunderstanding that cybersecurity often relies on obscurity as its primary form of defense. As the thinking goes, if adversaries don’t know about or understand the security controls that security vendors have in place, it will be easier to defend against cyberattacks.