Modern security operations centers need to shift from traditional SIEM-driven SOCs to Intelligence-Driven SOCs says Yitzhak Vager.
There's no need to update valid technologies unless the cost of maintaining them outweighs the upgrade cost. Take into account some legacy systems can increase your vulnerability if not designed for the current threat landscape.
Faced with a shortage of skilled IT security staff, prioritising alerts can be an important strategy. By creating a set of defined processes and routines, security teams can review sets of data regularly in order to spot anomalies
Some departing employees have no loyalties to their previous employer, so it is imperative that deprovisioning employees' corporate access on their last day is an absolute priority.
The human is the most essential part of any security programme and they need frictionless ways to work with data, be more productive, secure their environments, and apply their own methods to their tools says Josh Mayfield.
In this issue's reviews, we have a pretty good mix of pure-play, hybrid SIEM/UTM and next-generation tools, says technology editor Peter Stephenson
There are many managed security services on the market - the variety and scope of which can be confusing. Luke Ager considers what matters most.
The threat landscape has changed and we have to constantly challenge the existing thinking to get ahead of our adversaries RSA president Amit Yoran told delegates on Tuesday.
Big Data security analytics could trump SIEM solutions in the battle to keep out cyber attackers.
Trustwave's annual Global Security Report reveals that the number of data breaches is increasing, and yet a significant number of organisations remain blind to the threat, or unable to detect what caused the intrusion.
IT decision makers are leveraging Big Data security analytics tools to serve up more information on threats, reports Doug Drinkwater.
Information security budgets will increase in 2014, with 45 per cent of organisations planning to spend more this year and only 11 per cent cutting back, according to the latest Information Security Study from 451 Research.
Collaborative sharing of security data across enterprises, countries and industry sectors in a single big data store will be the future of protecting against advanced persistent threats, RSA delegates were told today.
How do they get any sleep at all asks Andy Aplin who advises CISOs to deploy dynamic security systems and strategies and choose an approach which complements the organisation's specific business needs and vulnerabilities
The first finalists have now been shortlisted for this year's SC Awards Europe 2014. Scroll down the page to see what awards are up for grabs...
It may be a time of great change for the infosec industry, but advice on achieving the budgets needed to keep up with new threats remains remarkably consistent, reports Thomas Brewster.
Users are blind to threats that occur on the endpoint and require intelligence to understand the threat, according to Bit9.
Attending a recent social event, I was able to get together with some major names from IT giant HP.
The proposed 24-hour breach notification law will be a challenge for smaller businesses, but not for enterprises.
Businesses across the UK are failing to turn the data at their disposal into a competitive advantage.
BAE Systems Detica is to launch a tool that combines Big Data analytics with event analysis and investigation tools.
Properly integrated identity and access management (IAM) and security incident and event management (SIEM) can assist in combating modern targeted attacks, as well as doing the traditional functions.
Essex County Fire & Rescue Service deloys integrated log management and security information and event management (SIEM) solution from LogRhythm.
RSA has combined technology from the acquisition of NetWitness to create a granular analytics platform.