XDR – What it is and how it differs from SIEM

The Challenge

Albert Einstein said, “We cannot solve our problems with the same thinking we used when we created them. “

In the security orchestration, detection and response arena, for the past twenty or so years, vendors have been doing essentially more of the same, while...

Read the full article

Aug 25, 2020

How to not fall for Phishing attacks (like the Twitter breach)

I just had an article published in Solutions Review covering the Twitter breach in which I addressed some of the vulnerabilities that may have been exploited in this attack, and what we can do to not fall victim to similar attacks. Twitter shared that: “We detected what we...

Read the full article

Jul 22, 2020

To Make VPNs Effective, Not All SIEMs Are Created Equal

I recently published an article in Infosecurity Magazine about the dangers of putting our trust in Virtual Private Networks (VPN). Though VPNs have been with us for two decades, now that many more people are working from home, organizations are depending on them more and more.

Read the full article

Jul 09, 2020

New Version of i-SIEM Includes More Entity-Focused Features

I recently wrote an article, published in Solutions Review, on the benefits of approaching security orchestration and management through the lens of entities, rather than events. My argument in the article, as well as in a webinar on this topic, was that, like effective...

Read the full article

Jun 16, 2020

The Unique Challenges Facing SOC Teams at Large Organizations and How SIEM Automation Can Help

Security teams at large, distributed organizations face unique challenges, with analysts often working in the dark, lacking essential information about the organization. Automation technology can help bridge the gap caused by these more complex networks.

...

Read the full article

May 06, 2020

5 Technologies to Look for When Choosing a SIEM to Protect Your Organization in the Coronavirus Crisis

COVID-19 is wreaking havoc with our lives and our businesses, but hackers aren’t resting. If anything, we’ve seen the level of cyber attacks increase and specifically target new vulnerabilities. Those entrusted with protecting organizations don’t have the luxury to panic, but...

Read the full article

Mar 30, 2020

Main Insights from Gartner’s SIEM Magic Quadrant Report

Every year the SIEM industry holds its breath for Gartner’s SIEM Magic Quadrant report. And for good reason. Gartner coined the term SIEM in 2005 and is still an authority on the SIEM industry.  The 2020 report holds some words of wisdom vendors should heed. Here are my three...

Read the full article

Feb 26, 2020

Iran Is Using MITRE. You Should Too.

Iran cyber attacking the US is no longer a threat - it's our reality. How we can better prepare ourselves and make sure our SIEM is equipped to deal with this very serious threat?

Read the full article

Jan 09, 2020

Log analysis - SIEM SIEM, but different

Your Elastic stack is up and running, and you’re using Logstash for SIEM purposes. But you’re overwhelmed to discover that while every new system produces heaps and heaps of logs, each vendor uses their own data format, and employs a different set of values for describing...

Read the full article

Dec 25, 2019

How MITRE Helps Break Down the “Tower of Babel” for SIEM

Since its first days, cyber security developed in a patchwork fashion.  A security need came up, a product was developed to address it.  After many years of this, the whole contraption reflects the ad-hoc way in which it was formed, like a kid’s tower of blocks about to...

Read the full article

Jul 22, 2019
No More Posts