Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SIEM

The latest News and Information on Security Incident and Event Management.

Cloud-native SOAR and SIEM solutions pave the road to the modern SOC

The ever-evolving cyber threat landscape gives birth to new, unprecedented cyberattacks that challenge traditional cybersecurity approaches and force security operations centers (SOCs) to evolve and redefine their methods. To ensure that the integrity of their data is well-protected, SOCs have to be one step ahead of malicious actors. Ergo, the necessity of creating the modern SOC comes into play.

Using event correlation and AI for Threat Detection and Incident Response

According to Cybersecurity Ventures, cybercrime will cost the world $10.5 trillion annually by 2025. However, it is alarming how many companies are unaware of the aftermath of being attacked. A successful attack can cause irreversible damage to companies’ finances. This is because attacks include money theft, damage, and destruction of data, interruption in services, decreased productivity, theft of intellectual property, theft of personal and financial data, reputational harm, and others.

Adopt user analytics to accelerate security investigations

Machine data analytics is the process of parsing data generated by software from a wide variety of sources including servers, networks, applications and financial records. These, and many other similar sources, produce massive amounts of data including from local operating systems, identity/access management tools, cloud consoles and their associated log files, alerts, scripts and profiles.

LogSentinel DEMO Account

LogSentinel #SIEM #DEMO Sophisticated dashboards, that can be customised according to user preferences, are also available there. On the threat map, you can see the IP’s locations of the actors who have triggered a #security threat for a certain period. The statistical overview gives valuable insight into the top actions, actors, entities or data sources. What’s more, you can search by user activity and familiarise yourself with a specific actor’s behaviour.

Devo's Use Case-Driven Approach to Accelerate SIEM Time to Value

Organizations cannot wonder if a data breach will happen — they must prepare for when that day comes. Early detection is key to mitigating an attack when it inevitably occurs, but how can CISOs ensure their teams can sift through all the noise they encounter in the SOC to spot malicious activity? Security information and event management (SIEM) technology can play a critical role in empowering your security team to detect potential indicators of compromise faster.

Datadog Cloud Security Platform

Datadog's Cloud Security Platform—consisting of Cloud SIEM, Posture Management, and Workload Security—delivers real-time threat detection and continuous configuration audits across your applications, hosts, containers, and cloud infrastructure. Datadog derives security insights from your observability data, enabling security and DevOps teams to work together to detect, investigate, and remediate threats.

Identifying exploits and adversary tradecraft of FORMBOOK information-stealing campaign

We wanted to call out some great adjacent research from the team at Sophoslabs Uncut that was released on December 21, 2021. Research groups frequently analyze similar (or in this case, identical) campaigns through their own unique lens. This is fantastic for the security community, as the campaign gets more eyes and different perspectives applied towards the same problem.