Posts

Death of the Tier 1 SOC Analyst

Say goodbye to the entry-level security operations center (SOC) analyst as we know it.
Source: Cyber Monitoring

Deception Technology: Prevention Reimagined

How state-of-the-art tools make it practical and cost-effective to identify and engage attackers in early lateral movement stages to prevent them from reaching critical systems and data.
Source: Cyber Monitoring

Siemens Teams Up with Tenable

ICS/SCADA vendor further extends its managed security services for critical infrastructure networks.
Source: Cyber Monitoring

Advanced Analytics + Frictionless Security: What CISOS Need to Know

Advances in analytics technologies promise to make identity management smarter and more transparent to users. But the process is neither straightforward nor easy. Here’s why.
Source: Cyber Monitoring

Unstructured Data: The Threat You Cannot See

Source: Cyber Monitoring

How to Live by the Code of Good Bots

Following these four tenets will show the world that your bot means no harm.
Source: Cyber Monitoring

7 SIEM Situations That Can Sack Security Teams

SIEMS are considered an important tool for incident response, yet a large swath of users find seven major problems when working with SIEMs.
Source: Cyber Monitoring

Security Orchestration & Automation: Parsing the Options

Once you head down the path of orchestration, security teams will need to decide how much automation they are ready for. Here’s how.
Source: Cyber Monitoring

Using AI to Break Detection Models

Pitting machine learning bots against one another is the new spy vs. spy battle in cybersecurity today.
Source: Cyber Monitoring