Manage Digital Risk
Address Critical Business Needs
The Realm of Threat Intelligence - The Logs are dead; long live the Logs!
In the previous blog post we looked at Network Packets (PCAP’s) and how they can be utilized within a SOC environment. In this post we will build on this and take a look at Logs (which most of the security sales staff will now tell you that it is going to solve all your security...
Read more
XDR versus Evolved SIEM – What’s the Difference?
What’s the difference between XDR and evolved SIEM?
Demand More from Your SIEM
By Mike Adler, VP Product, NetWitness Suite If you’re like a lot of IT security professionals, you’ve always been able to rely on your SIEM to provide log data for threat detection. But that’s just not enough to keep up with all the new threats from new sources that are bombarding organizations today. Can your...
Turbocharge your Threat Detection and Response with Endpoint Data
Much like the first internal combustion engine, SIEM needs a turbo boost.
Tales from the Black Hat NOC: Setup in London
Arrival into London went without a hitch. I then took the train to Angel station and walked to the Business Design Center, which is my home for the next week, during the Black Hat Europe 2016. After walking through the doors and finding my way I was greeted by a room full of boxes. Time to...
The Realm of Threat Intelligence - Attack Scenarios and Use Cases
The three previous blogs in this series have covered Packet Analysis, Log Analysis and Threat Intelligence; this final article aims to bring all of this information into one cohesive solution for any SOC or Cyber Defence organisation. For further reading on this subject please see our presentation at last year’s RSA Conference in Abu Dhabi...
Tales from the Black Hat NOC: Finding Mr. Robot?
The most significant part of Black Hat Europe 2016 finally started, and as expected – we are watching the arrival of smart security experts, who have come to the event to exchange information or show off their latest tools and products. While it’s hard to say what kind of skilled “hackers” we can expect during last...
The Realm of Threat Intelligence - It's all about the Packets, or is it?
Full Packet Capture (FPC), those three little words are enough to make most security analyst salivate at the prospect of finding and detecting attacks. Back in the days before anyone realized that you could build an Intrusion Prevention System to actually stop attacks, the Intrusion Detection System was king. If you were very lucky you...
Part 4: Fundamentals of the Game - There is no intelligence without data
After having identified the set of fundamental skills needed to set up a successful SOC, highlighted the importance of the alignment between SOC and business goals, and understood how people, processes, and technology must work together for a SOC to be successful, we now investigate the next SOC fundamental skill: focus on data through visibility...
The Journey to an Intelligent SOC
Find out how to build your roadmap for maximum impact.
Blog posts by category
Around RSA
Industry Perspectives
Products & Solutions
Securing the Digital World
The Language of Cybersecurity
Need help? Click on the button below to begin a chat session.