Security Operations & Analytics

Splunk Addressed Several Vulnerabilities in Enterprise and Light Products

Splunk recently addressed several vulnerabilities in Enterprise and Light products, some of them have been rated “high severity.” Splunk Enterprise

Zeek: A Free, Powerful Way to Monitor Networks, Detect Threats

It’s common in many organizations for network and security operations to exist in silos. This may have been OK a

Gartner Names Demisto ‘Cool Vendor’ in Security Ops & Vulnerability Management

According to Gartner, “Future security operations, incident response and threat intelligence teams will use more automation and more consistent processes,

The Evolution of Security Operations, Automation and Orchestration

The market for security operations, automation and orchestration products is rapidly maturing. The most recent proof point of this maturation

SC Magazine Names Aruba IntroSpect UEBA as Industry’s Finest for Detecting Advanced Cyberattacks

Aruba, a Hewlett Packard Enterprise company (NYSE: HPE), announced that SC Magazine, named Aruba IntroSpect as this year’s best product

Enterprise Plans for Security Automation and Orchestration

With the global cybersecurity skills shortage hanging over them, CISOs are turning to security automation and orchestration technologies to improve

Getting The Most Out of Your SIEM Investment

Over the last 10-15 years, many organizations built Security Operations Centers (SOCs) on the backbone of security information and event

The Emergence of Virtual Reality and Augmented Reality in the Security Operations Center

Organizations are increasingly clustering their skills and capabilities into security operations centers (SOCs). An SOC is a focused facility where

Improving the Cyber Analyst Workflow Through Gamification

Gamification — the process of applying game principles to real-life scenarios — is everywhere, from U.S. army recruitment to immersive cybersecurity

Best Practices For Incident Response In The Age of Cloud

Most CISOs receive a rude awakening when they encounter their first major security issue in the cloud. If they identify

LogRhythm Adds New Layer To Its SIEM 2.0 Big Data Security Analytics Platform

BOULDER, Colo.–October 16, 2012–LogRhythm, the leader in cyber threat defense, detection and response, today announced the enhancement of its award-winning

Security Analytics will be the Next Big Thing in IT Security

Most enterprises have enough security technology in place to protect their businesses. They also have plenty of data from SIEMS

The Practice of Network Security Monitoring, Review: A Hands-on Guidebook

A firewall will no longer protect your company network: you have to cope with users needing to take documents out,