XDR – What it is and how it differs from SIEM

The Challenge

Albert Einstein said, “We cannot solve our problems with the same thinking we used when we created them. “

In the security orchestration, detection and response arena, for the past twenty or so years, vendors have been doing essentially more of the same, while...

Read the full article

Aug 25, 2020

How to not fall for Phishing attacks (like the Twitter breach)

I just had an article published in Solutions Review covering the Twitter breach in which I addressed some of the vulnerabilities that may have been exploited in this attack, and what we can do to not fall victim to similar attacks. Twitter shared that: “We detected what we...

Read the full article

Jul 22, 2020

To Make VPNs Effective, Not All SIEMs Are Created Equal

I recently published an article in Infosecurity Magazine about the dangers of putting our trust in Virtual Private Networks (VPN). Though VPNs have been with us for two decades, now that many more people are working from home, organizations are depending on them more and more.

Read the full article

Jul 09, 2020

New Version of i-SIEM Includes More Entity-Focused Features

I recently wrote an article, published in Solutions Review, on the benefits of approaching security orchestration and management through the lens of entities, rather than events. My argument in the article, as well as in a webinar on this topic, was that, like effective...

Read the full article

Jun 16, 2020

The Unique Challenges Facing SOC Teams at Large Organizations and How SIEM Automation Can Help

Security teams at large, distributed organizations face unique challenges, with analysts often working in the dark, lacking essential information about the organization. Automation technology can help bridge the gap caused by these more complex networks.

...

Read the full article

May 06, 2020

Bringing Security Architecture Into the Light – the Inherent Value of Transparency and Diagnostics

The huge challenge presented by today’s attack campaigns – multi-stage attacks, with thousands of constantly evolving attack vectors – have led organizations to buy large number of of security products, and to rely on more IT data sources, in order to defend their networks. 

Read the full article

May 01, 2020

5 Technologies to Look for When Choosing a SIEM to Protect Your Organization in the Coronavirus Crisis

COVID-19 is wreaking havoc with our lives and our businesses, but hackers aren’t resting. If anything, we’ve seen the level of cyber attacks increase and specifically target new vulnerabilities. Those entrusted with protecting organizations don’t have the luxury to panic, but...

Read the full article

Mar 30, 2020

The Empowering Impact of Women at empow

Happy International Women's Day!  empow's R&D team is today 60% women.  How did we do it and what does it mean for the company culture?

Read the full article

Mar 08, 2020

Main Insights from Gartner’s SIEM Magic Quadrant Report

Every year the SIEM industry holds its breath for Gartner’s SIEM Magic Quadrant report. And for good reason. Gartner coined the term SIEM in 2005 and is still an authority on the SIEM industry.  The 2020 report holds some words of wisdom vendors should heed. Here are my three...

Read the full article

Feb 26, 2020

Inside the Matrix: MITRE ATT&CK™

When open source parsers utilize the MITRE ATT&CK Framework, security analysts can use their time much more effectively - investigating the nature of threats instead of sifting through endless logs.

Read the full article

Feb 19, 2020
No More Posts