Intelligence & Analytics September 8, 2017 A Basic Model to Measure SIEM Maturity 4 min read - Companies looking to improve their ability to protect, control and monitor their technology infrastructures should follow this basic SIEM maturity model.
Intelligence & Analytics September 7, 2017 Is Your Company Secure by Design? Aligning Security With Business Objectives 2 min read - The key to aligning security with business objectives is to make assets secure by design, which gives analysts sufficient visibility to respond to threats.
Risk Management September 6, 2017 Know Your Data and Your Enemies: Establishing a Baseline for Proactive Threat Hunting 3 min read - Threat hunting enables security teams to improve incident response speed and accuracy. It also empowers them to remediate threats proactively.
Intelligence & Analytics September 1, 2017 Analyze Attack Patterns to Make Your Environment Secure by Design 2 min read - By analyzing attack patterns and making their environments secure by design, analysts can control devices remotely without impeding change management.
Artificial Intelligence August 31, 2017 Why Machine Learning Is an Essential Tool In the CISO’s Arsenal 4 min read - To protect their networks from malicious insiders, user negligence and other threats, CISOs need advanced machine learning capabilities such as UBA.
Intelligence & Analytics August 24, 2017 Using Phishing Intelligence to Reel In Advanced Threats and Protect Corporate Networks 3 min read - By integrating phishing intelligence with an SIEM solution, security analysts can proactively monitor APTs and manage risks related to phishing attacks.
Intelligence & Analytics August 21, 2017 Security Monitoring and Analytics: Moving Beyond the SIEM 2 min read - A platform approach to security monitoring empowers analysts to take their SIEM to the next level with advanced threat detection and response capabilities.
Fraud Protection August 17, 2017 Protecting Against Spam and Phishing Attacks With a Layered Approach to Email Security 3 min read - To protect their users from spam and phishing attacks, security professionals should adopt a basic, layered approach to email security.
Intelligence & Analytics August 16, 2017 Not Enough Hours in the Day? Respond Faster With Automated, Intelligent Security Analytics 3 min read - An automated security analytics platform can help understaffed security teams sift through threat data more efficiently and focus on more critical tasks.
Cloud Security August 15, 2017 Best Practices for Developing and Securing a Microservices Architecture 2 min read - When installing a microservices architecture, SecDevOps teams must understand the threat vectors and how they affect the company's compliance stature.