How to not fall for Phishing attacks (like the Twitter breach)

I just had an article published in Solutions Review covering the Twitter breach in which I addressed some of the vulnerabilities that may have been exploited in this attack, and what we can do to not fall victim to similar attacks. Twitter shared that: “We detected what we...

Read the full article

Jul 22, 2020

To Make VPNs Effective, Not All SIEMs Are Created Equal

I recently published an article in Infosecurity Magazine about the dangers of putting our trust in Virtual Private Networks (VPN). Though VPNs have been with us for two decades, now that many more people are working from home, organizations are depending on them more and more.

Read the full article

Jul 09, 2020

New Version of i-SIEM Includes More Entity-Focused Features

I recently wrote an article, published in Solutions Review, on the benefits of approaching security orchestration and management through the lens of entities, rather than events. My argument in the article, as well as in a webinar on this topic, was that, like effective...

Read the full article

Jun 16, 2020

The Unique Challenges Facing SOC Teams at Large Organizations and How SIEM Automation Can Help

Security teams at large, distributed organizations face unique challenges, with analysts often working in the dark, lacking essential information about the organization. Automation technology can help bridge the gap caused by these more complex networks.

...

Read the full article

May 06, 2020
No More Posts