For security leaders, the process of defining an SIEM strategy is never complete. A successful deployment requires careful planning, regular review and a culture of continuous improvement.
The EY "Global Infomation Security Survey" revealed that CISOs and executives have a long road ahead when it comes to improving communication — but it is indeed a road, not an unbridgeable chasm.
According to Gartner, cybersecurity spending will reach an all-time high next year as enterprises try to maintain compliance and protect their data.
Thanks to their harrowing experience with the Evil Witch, Hansel and Gretel went on to become expert threat hunters to protect the children of the forest.
The threat landscape is expanding, and organizations must undergo a cognitive convergence to manage evolving security, fraud and operational risks.
A new threat detection service known as Amazon GuardDuty aims to help protect Amazon Web Services (AWS) users from security risks as technology evolves.
A new cybergang operating a recent variant of the Ursnif Trojan has planted its flag in Australia, targeting banking customers with redirection attacks.
IBM and Cisco are teaming up to provide mutual customers with more efficient security and a better integration of security products.
SIEM has evolved from its comparatively humble beginnings to integrate user behavior analysis and log management capabilities that are critical to any SOC.
Steganography continues to be an incredibly versatile and effective method for obscuring or hiding information in plain sight.