A fusion center uses a wider set of data sources, collects data from both inside and outside the organization, and delivers it to the right people to help them respond and recover more efficiently.
SIEM tools can help security operations center (SOC) teams detect threats, but what good is threat data without the context analysts need to quickly respond to incidents? That's where SOAR comes in.
A level 3 security analyst announced he'll be taking a six-month leave due to "seriously fatigued fingers" and "a wonky eye" resulting from his daily activities to ensure data security and compliance.
Many vendors at RSAC 2019 boasted of their advanced and even automated threat hunting capabilities, but it's important to understand the difference between true threat hunting and marketing jargon.
It's hard to believe a computer that couldn't read a newspaper was once considered smart. But as recent innovations in AI for cybersecurity have shown, we are constantly raising the bar for smart.
To stay ahead of attackers, organizations should consider vulnerability management solutions that integrate with SIEM tools, network and threat modeling capabilities, and patch management systems.
By following the example of industry leaders with mature security analytics capabilities, less advanced organizations can improve SOC visibility and shift from reactive to proactive threat detection.
Security analysts identified a sample of Linux crypto-mining malware that kills any other malicious miners upon installation.
Starting a new job in the CISO role can feel overwhelming. But the time for security to be seen as a key player — and to have a major business impact — has never been better.
An analysis of more than 4.4 million malware samples showed botnets were responsible for crypto-mining at least 4.3 percent of Monero over a 12-year period.