In my previous column, I discussed the “So What Factor”, which reminds us that we must know our audience. Many of the people we...
Hi, what are you looking for?
In my previous column, I discussed the “So What Factor”, which reminds us that we must know our audience. Many of the people we...
While There are Exceptions, Most Business Executives View Security as a Necessary Evil...
In Security Operations, Less Is More. Incident Response Teams Should Focus on Data Value Instead of Data Volume.
Recently, at a round table discussion, I heard someone make the statement, “In five years, there will be no more security analysts. They will...
What Can we do Once we Identify the Root Cause? We Can Work to Address it.
There is no shortage of headlines these days detailing breaches, Advanced Persistent Threats (APTs), and other such attention grabbing topics. The details vary in...
Framing the Challenges in the Security Realm Properly is an Important First Step in Addressing Them
In Physics, the event horizon of a black hole is the point at which the black hole’s gravitational pull becomes so great that nothing...
Many Security Operations Centers (SOCs) find themselves inundated with and overwhelmed by large volumes of false positives, non-actionable alerts, and noise. People often ask...
As I discussed in my previous column entitled “Understanding The Challenges In Information Sharing”, information sharing is an integral part of a mature security...
With the Ever-Changing Threat Landscape, Knowledge is Power.
An Alert-based Security Operations Model Does Not Scale to Meet Today’s Complex Threat Landscape and Enerprise Demands.