Security Operations & Analytics

SIEM Better Visibility for SOC Analyst to Handle an Incident with Event ID

We are in the complex world where attacks are increasing day by day, so today the cyber intelligence depends on

Sumo Logic Acquires JASK

Californian security-event management company Sumo Logic has acquired JASK Labs, Inc. JASK makes security information and event management (SIEM) software

Most Important Cyber Incident Response Tools List for Ethical Hackers and Penetration Testers

Cyber Incident Response Tools are more often used by security industries to test the vulnerabilities and provide an emergency incident

Splunk Addressed Several Vulnerabilities in Enterprise and Light Products

Splunk recently addressed several vulnerabilities in Enterprise and Light products, some of them have been rated “high severity.” Splunk Enterprise

Gartner Names Demisto ‘Cool Vendor’ in Security Ops & Vulnerability Management

According to Gartner, “Future security operations, incident response and threat intelligence teams will use more automation and more consistent processes,

SC Magazine Names Aruba IntroSpect UEBA as Industry’s Finest for Detecting Advanced Cyberattacks

Aruba, a Hewlett Packard Enterprise company (NYSE: HPE), announced that SC Magazine, named Aruba IntroSpect as this year’s best product

Getting The Most Out of Your SIEM Investment

Over the last 10-15 years, many organizations built Security Operations Centers (SOCs) on the backbone of security information and event

The Emergence of Virtual Reality and Augmented Reality in the Security Operations Center

Organizations are increasingly clustering their skills and capabilities into security operations centers (SOCs). An SOC is a focused facility where

Improving the Cyber Analyst Workflow Through Gamification

Gamification — the process of applying game principles to real-life scenarios — is everywhere, from U.S. army recruitment to immersive cybersecurity

Best Practices For Incident Response In The Age of Cloud

Most CISOs receive a rude awakening when they encounter their first major security issue in the cloud. If they identify

LogRhythm Adds New Layer To Its SIEM 2.0 Big Data Security Analytics Platform

BOULDER, Colo.–October 16, 2012–LogRhythm, the leader in cyber threat defense, detection and response, today announced the enhancement of its award-winning

Security Analytics will be the Next Big Thing in IT Security

Most enterprises have enough security technology in place to protect their businesses. They also have plenty of data from SIEMS

The Practice of Network Security Monitoring, Review: A Hands-on Guidebook

A firewall will no longer protect your company network: you have to cope with users needing to take documents out,