What Is Next Generation SIEM? 8 Things to Look For

The SIEM market has evolved and today most solutions call themselves “Next Generation SIEM.” Effective NG SIEM should provide better protection and equally important, if not more, a much more effective, next gen user experience. What you should look for when evaluating a next generation SIEM? The state of cybersecurity has evolved one threat at a time, with organizations constantly adding new technologies to combat new threats. The result? Organizations…

November 14, 2019
Read More >>

Cybersecurity and Online Trading: An Overview

Trade and cybersecurity are inherently linked. The promise of the information revolution was always that it would allow people to connect internationally, and that it would make international investment available for everyday citizens. It has certainly done that, but as trade and investment grow ever more complex, the risks also grow. Alongside the development of international investment networks has developed another, shadowy network of hackers and unscrupulous investment companies. As…

October 25, 2019
Read More >>

Artificial Intelligence: The Next Frontier in Information Security

Artificial Intelligence (AI) is creating a brand new frontier in information security. Systems that independently learn, reason and act will increasingly replicate human behavior. However, like humans, they will be flawed, but capable of achieving incredible results. AI is already finding its way into many mainstream business use cases and business and information security leaders alike need to understand both the risks and opportunities before embracing technologies that will soon…

October 23, 2019
Read More >>

Five Main Differences between SIEM and UEBA

Corporate IT security professionals are bombarded every week with information about the capabilities and benefits of various products and services. One of the most commonly mentioned security products in recent years has been Security Information and Event Management (SIEM) tools. And for good reason. SIEM products provide significant value as a log collection and aggregation platform, which can identify and categorize incidents and events. Many also provide rules-based searches on…

October 23, 2019
Read More >>

For Cybersecurity, It’s That Time of the Year Again

Autumn is the “hacking season,” when hackers work to exploit newly-disclosed vulnerabilities before customers can install patches. This cycle gives hackers a clear advantage and it’s time for a paradigm shift. Each year, when the leaves start changing color you know the world of cybersecurity is starting to heat up. This is because the cyber industry holds its two flagship events — DEFCON and BlackHat —over the same week in…

October 18, 2019
Read More >>

Myth Busters: How to Securely Migrate to the Cloud

Security is top of mind for every company and every IT team – as it should be. The personal data of employees and customers is on the line and valuable company information is at risk. Security protocols are subject to even closer scrutiny when companies are considering migrating to the cloud. More and more enterprises recognize that they need to pursue cloud adoption to future-proof their tech stack and achieve…

October 18, 2019
Read More >>

Microsoft Makes OneDrive Personal Vault Available Worldwide

Microsoft this week announced that users all around the world can now keep their most important files protected in OneDrive Personal Vault. Launched earlier this summer, the Personal Vault is a protected area in OneDrive that requires strong authentication or a second identification step to access. Thus, users can store their files and ensure that they can’t be accessed without a fingerprint, face, PIN, or code received via email or…

October 1, 2019
Read More >>

Human-Centered Security: What It Means for Your Organization

Humans are regularly referred to as the ‘weakest link’ in information security. However, organizations have historically relied on the effectiveness of technical security controls, instead of trying to understand why people are susceptible to mistakes and manipulation. A new approach is clearly required: one that helps organizations to understand and manage psychological vulnerabilities, and adopts technology and controls that are designed with human behavior in mind. That new approach is…

September 24, 2019
Read More >>

How Ethical Hackers Find Weaknesses and Secure Businesses

When people hear about hackers, it typically conjures up images of a hooded figure in a basement inputting random code into a computer terminal. This Hollywood cliché is far from the truth from modern-day cybersecurity experts, and it’s also important to note that not all hackers are malicious. Hackers and their role in information cybersecurity is a vastly growing career on a global scale. Market research predictions in the cybersecurity…

September 11, 2019
Read More >>

New Passive RFID Tech Poses Threat to Enterprise IoT

As RFID technology continues to evolve, IoT security measures struggle to keep pace. The Internet of Things (IoT) industry is growing at a staggering pace. The IoT market in China alone will hit $121.45 billion by 2022 and industry analysts predict that more than 3.5 billion devices will be connected through IoT globally by 2023.  Among the most important technologies precipitating this breakneck growth is RFID or Radio Frequency Identification….

September 11, 2019
Read More >>