If a store you visit often suffers a cyberattack, you might feel like someone went through your wallet. This kind of attack or data breach, and this kind of feeling,…
Browsing CategoryBehavioral Analytics
The Past, Present and Future of Security Information and Event Management (SIEM)
With the release of the 2020 Gartner Magic Quadrant for Security Information and Event Management (SIEM), we feel that it is an appropriate time to reflect on the evolution of…
SIEM Event Normalization Makes Raw Data Relevant to Both Humans and Machines
A security information and event management (SIEM) system is an indispensable tool for any security operations center (SOC). It collects events from devices in your network infrastructure such as servers,…
Close the Gap on Advanced Threats With Integrated Security
The board of directors is finally starting to grasp that security risk equals business risk. But as you finalize your presentation on the company’s cybersecurity posture, you can’t help but…
Overcoming the Electronics Industry’s Insecurity Over Industrial IoT Deployments
In December 2017, cyberattackers used TRITON/TRISIS malware to target safety instrumented system (SIS) controllers at a critical infrastructure organization. The malware was designed specifically to interact with the controllers, potentially…
Which Mobile Threats Do You Need to Prepare For?
Mobile devices are more ubiquitous than ever, with immeasurable amounts of data now being shared and manipulated on mobile platforms. Organizations rely heavily on their mobile environment to make business…
How Analytics Can Help You Better Understand Access Risks
Cloud, the Internet of Things (IoT), mobile and digital business initiatives have broadened the surface and increased the complexity of identity and access management (IAM) environments. With millions of entitlements…
Move Over, Ransomware: Why Cybercriminals Are Shifting Their Focus to Cryptojacking
According to the 2018 IBM X-Force Threat Intelligence Index, the frequency and sophistication of malicious cryptocurrency mining, also called “cryptojacking,” has increased drastically in the past year. This mining is…
How Can Security Leaders Maintain Control of Privileged Accounts?
The primary key performance indicator (KPI) of a system administrator is the ability to make things work — plain and simple. When people encounter problems related to system access rights,…