Intelligence & Analytics July 12, 2017 Preventative Medicine: Get a Health Check for Your SIEM 2 min read - Like the human body, security information and event management (SIEM) solutions require regular checkups to maintain optimal functionality.
Intelligence & Analytics July 6, 2017 Using SIEM Solutions to Connect the Security Dots and Detect Ransomware 6 min read - Security tools can only provide so much value in isolation. An SIEM platform helps analysts connect the dots between data produced by disparate solutions.
Intelligence & Analytics June 16, 2017 The Power of the Security Immune System 2 min read - A security immune system is an integrated set of complimentary controls — not a single solution — working together to protect network data.
Intelligence & Analytics May 26, 2017 Using Security Intelligence to Detect Insider Threats From Cloud-Based Applications 2 min read - Security intelligence solutions such as QRadar UBA enable analysts to detect potentially malicious activity on Microsoft Office 365 cloud-based apps.
Intelligence & Analytics May 12, 2017 More Than Meets the Eye: Five Common Misunderstandings About SIEM Solutions 2 min read - SIEM solutions are not meant to prevent security breaches. Rather, they are designed to strengthen the organization's overall security posture.
Intelligence & Analytics April 28, 2017 Address Registry and File Activity Monitoring Requirements With the Snare Log Analysis App 2 min read - The Snare Log Analysis App offers security analysts an extra pair of eyes to help them analyze SIEM logs and meet file activity monitoring requirements.
Intelligence & Analytics April 19, 2017 Surfing the Tsunami of Threat Data With Cognitive Security 2 min read - Nowadays, most organizations' networks are under constant attack. Cognitive security is the key to locating IoCs within the tsunami of threat intelligence.
Intelligence & Analytics April 18, 2017 UEBA: Canary in a Coal Mine 3 min read - User entity behavioral analysis (UEBA) can provide analysts with actionable insights and early warnings of threats, much like a canary in a coal mine.
Data Protection April 14, 2017 Swimming in Security Data Without Drowning 4 min read - With so much security data and threat intelligence available, IT professionals are struggling to stay afloat in this expansive ocean of information.
Intelligence & Analytics April 5, 2017 Becoming an Agile Cyber-Ninja: Implementing SIEM the Right Way in 2017 3 min read - To get the most out of SIEM tools such as QRadar, security analysts should abandon the traditional Waterfall methodology and adopt the Agile approach.