eBook: The Inefficiencies of Legacy Tools – Why SIEMs Alone Are Ineffective At Detecting Advanced Attacks

eBook: The Inefficiencies of Legacy Tools – Why SIEMs Alone Are Ineffective At Detecting Advanced Attacks

Relying solely on legacy Security Information and Event Management (SIEM) technology is no longer sufficient to protect enterprise organizations from the rising amount of modern, ai-developed, sophisticated cyberattacks. In our newest eBook, ...
Unleashing the Power of Self-Supervised AI: Insights from 451 Research Report on MixMode’s Dynamic Threat Detection and Response

Unleashing the Power of Self-Supervised AI: Insights from 451 Research Report on MixMode’s Dynamic Threat Detection and Response

In an era where cyber threats are becoming increasingly sophisticated, it is crucial for organizations to stay ahead of attacks. By leveraging the power of self-supervised AI, MixMode offers a game-changing solution ...
Aligning an Organization’s Attack Surface to Detection Surface is Key to Adversary Defense in Today’s Cloud Era

Aligning an Organization’s Attack Surface to Detection Surface is Key to Adversary Defense in Today’s Cloud Era

With the Cloud Era, the IT asset estate has expanded, and there is a diverse set of attack surfaces to defend. The term "attack surface" describes the growing IT asset estate, but ...
Automatically Catch Sight of Critical Threats with LogRhythm Axon

Automatically Catch Sight of Critical Threats with LogRhythm Axon

With the amount of data continuously feeding into a security operations platform, it is more important than ever to be able to identify the most critical threats and know immediately when those ...
MixMode’s Key Takeaways from the 2023 Gartner® Emerging Tech: Security— Improve Threat Detection and Response With AI-Based Behavioral Indications Report

MixMode’s Key Takeaways from the 2023 Gartner® Emerging Tech: Security— Improve Threat Detection and Response With AI-Based Behavioral Indications Report

Gartner recently released their newest report titled “Emerging Tech: Security - Improve Threat Detection and Response With AI-Based Behavioral Indications” which covers the emergent need for new AI-Based methods of using behavioral ...
SIEM Content, False Positives and Engineering (Or Not) Security

SIEM Content, False Positives and Engineering (Or Not) Security

As we learned, SIEM still matters in 2023.Debating SIEM in 2023, Part 1Debating SIEM in 2023, Part 2But since one winter day in 2002, when I wrote my first correlation rule for a ...
The 2 Questions Cybersecurity Clients Ask the Most When Seeking a Trustworthy Provider

The 2 Questions Cybersecurity Clients Ask the Most When Seeking a Trustworthy Provider

When businesses trust providers to address needs like cybersecurity, they are entrusting vital intellectual property, the private data of employees, consumers, and others, and often, the very infrastructure the business requires to ...
API Skyhawk Security modeling threat CosmicStrand insider threats Threat Modeling - Secure Coding - Cybersecurity - Security

Skyhawk Security Taps ChatGPT to Augment Threat Detection

Skyhawk Security today revealed it is employing ChatGPT to add generative artificial intelligence (AI) capabilities to its cloud threat detection and response (CDR) platform at no extra charge. Skyhawk Security CEO Chen ...
Security Boulevard
Debating SIEM in 2023, Part 2

Debating SIEM in 2023, Part 2

So, we went through “Debating SIEM in 2023, Part 1”, now let’s debate a bit more. At this point, everybody who didn’t “rage stop” reading it should be convinced that yes, SIEM ...
Swiss Army knife malware

Adaptable ‘Swiss Army Knife’ Malware a Growing Threat

There is a worrying rise in multipurpose malware, which can perform a variety of malicious actions and is adept at evasion, lateral movement and data encryption. These were among the findings of ...
Security Boulevard