Security | Threat Detection | Cyberattacks | DevSecOps | Compliance



CrowdStrike Announces Falcon LogScale and Falcon Complete LogScale

Every second, as your IT systems run every facet of your business, they are also creating data related to the health, performance and security of the systems themselves. This information, known as log data, is vital to SecOps, ITOps and DevOps teams as they seek to understand how the IT environment is functioning — and how secure those assets are.


Devo SOARs to New Heights with LogicHub Acquisition

In cybersecurity, one thing is certain: the bad guys are relentless. They never stop working and scheming to find new ways to attack weaknesses in data security. Their objective is criminally simple: breach organizations to steal and monetize data. And they use every means possible to do it. On the other side are cybersecurity companies and the professionals who work for them. We never stop working to improve our products and services to protect our customers from those global threat actors.


Security 101: Vulnerabilities, Threats & Risk Explained

In cybersecurity, the things to consider are endless. Before we get ahead of ourselves, let’s make sure we fully understand three fundamental concepts of security: In this article, we’ll look at these security concepts in depth and hear from industry experts. (For the latest and greatest in all things security, check out the Splunk Security Blog & these Cybersecurity and InfoSec Events & Conferences.)


Enhance Your Security Operations with SciSec Activeboards

With the overwhelming amounts of data, security teams need dynamic, real-time visualization capabilities to quickly make sense of the data they need to manage so they can take action where needed and convey the status of their security posture. Devo makes these objectives easy to accomplish using Activeboards.


Defense Department's Multi-Cloud Cloud Strategy: A Role for SIEM

It’s difficult to recall a time over the last ten years when cloud requirements were not at the forefront of the Defense Department’s modernization efforts. Cloud capability reviews and requirements, in some form, extend from the Pentagon’s net-centricy efforts — to the Joint Information Environment, Digital Modernization, and up through to today.