Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Analytics

kroll

Techniques for Effectively Securing AWS Lake Formation

A couple months ago, we received a request from one of our enterprise financial clients looking to build their internal data lake capabilities. The client wanted to know more about security best practices related to the AWS data lake management tool, AWS Lake Formation, and asked our team for help. One of our principal security consultants specializing in cloud got to work, preparing an overview of critical security considerations when architecting a data lake system.

splunk

Leveraging Your Data to Drive Business Outcomes and Improve Cyber Resilience

It was another eventful year for security professionals in 2022. The year began on the tail of the Log4j vulnerability, data breaches were on the rise, and ransomware attacks were as prevalent as ever. So it’s safe to say cyber resilience is required to be at the forefront for public sector leaders.

splunk

Splunk Named a Leader in The Forrester Wave: Security Analytics Platforms, Q4 2022

We’re thrilled to share that Splunk has been named a Leader in The Forrester Wave™: Security Analytics Platforms, Q4 2022. We are committed to developing world-class solutions for the SOC, so it's a true honor to be named a Leader by Forrester. We are proud to help organizations accelerate threat detection and investigations, achieve cybersecurity resilience, and navigate their most critical security challenges.

Polar Security

6 Tips to Create a Comprehensive Big Data Security Policy

We create 2.5 quintillion bytes every day. 90% of data in the world today was created in the last two years. This data comes from everywhere: sensors used to gather climate information, posts to social media sites, digital pictures and videos, purchase transaction records, and cell phone GPS signals to name a few. This deluge of data is called Big Data.

teleport

Securely Managing Your Audit Logs with Teleport and Snowflake

One of the most important features Teleport has to offer is that it centralizes all of your infrastructure’s audit logging into one central place, mapping every query, every command and every session to an individual user's identity. As you hire more engineers and resources scale, it can become increasingly difficult to manage all of this log data. Luckily Teleport’s extensibility makes this log data extremely easy to format, export and monitor all in a secure, event-driven way.

ssl2buy

Big Data : Introduction and Its Necessity in Today's World!

First, as not all data is automatically considered to be Large type data, let’s define what “Large Data” is and what makes it “big” before moving on to a more in-depth examination of Large Data analytics. The term “Big Data” describes large quantities of data of any form, including but not limited to the three forms : structured, unstructured, and semi-structured. Such data sets are constantly being produced at a high rate and in a considerable quantity.

alienvault

What is Data-as-a-Service (DaaS)? Understanding the benefits, and common use cases

If you were looking at all the opportunities data unlocks for your businesses, you’ve probably stumbled upon DaaS. DaaS stands for data as a service, which may appear as something overly complicated and expensive to consider. It’s quite the opposite, and it has the power to help a company leverage IoT and cloud data without investing heavily in infrastructure and software. To truly assess whether it is complicated to implement and what benefits it delivers, you need to know what DaaS is.

splunk

The Democratization of Data: The Pros & Cons of All That Data

Try going one day without navigating today’s data landscape — accepting or declining cookie pop-ups, determining whether and how a company can use your information, and all the data you’re generating simply by browsing the web. Yes, we live in the Data Age. We know we generate mind-boggling amounts of data. The data we generate in a single day is an unfathomable amount (2.5 quintillion bytes if you can do that math). More formally, we say that data has been democratized.

CrowdStrike

A Deep Dive into Custom Spark Transformers for Machine Learning Pipelines

CrowdStrike data scientists often explore novel approaches for creating machine learning pipelines especially when processing a large volume of data. The CrowdStrike Security Cloud stores more than 15 petabytes of data in the cloud and gathers data from trillions of security events per day, using it to secure millions of endpoints, cloud workloads and containers around the globe with the power of machine learning and indicators of attack.

graylog

Building Your Security Analytics Use Cases

It’s time again for another meeting with senior leadership. You know that they will ask you the hard questions, like “how do you know that your detection and response times are ‘good enough’?” You think you’re doing a good job securing the organization. You haven’t had a security incident yet. At the same time, you also know that you have no way to prove your approach to security is working. You’re reading your threat intelligence feeds.