Every discipline has its acronyms, but I’d venture to say cybersecurity has more than its share. We use them to describe threat actors and...
Hi, what are you looking for?
Every discipline has its acronyms, but I’d venture to say cybersecurity has more than its share. We use them to describe threat actors and...
An XDR implementation can quickly turn into a very large consulting project requiring significant time and budget
XDR must be approached as an open architecture where integration is the linchpinOver the past couple of months, I’ve talked about how adversaries are...
As adversaries changed their view of an attack to include vectors across an organization, defenders have had to evolve their approach as well. This...
As adversaries have shifted the focus of attacks to achieve their goals, defenders must evolve their approach to threat detection
Solving security's big data problem is about prioritized data flow, continuously processing data for analysis and translating and exporting it to create a single...
Extended Detection and Response (XDR) can be confusing based on so many different definitions and approaches
If we define XDR as a solution, SOCs can’t reach their ultimate destination because, as a solution, XDR can’t be a holistic approach
There’s a gap between the promise of a security technology and operational reality
Automation can’t be just about running the process, but must include three important stages
As Security Operations Centers (SOCs) mature, they need to tackle some tough challenges with respect to data, systems and people
The Ability to Think Global, Act Local is One of the Hallmarks of a Modern Security Operations Center