Tag: Security Intelligence
-
Combined Security Practices Changing the Game for Risk Management
A significant challenge within cyber security at present is that there are a lot of risk management platforms available in the market, but …
-
Tausight expands its AI-based PHI Security Intelligence platform to cover new attack vectors
Tausight has expanded its AI-based PHI Security Intelligence platform which automates the discovery and identification of electronic PHI to …
-
When Logs Are Out, Enhanced Analytics Stay In
I was talking to an analyst firm the other day. They told me that a lot of organizations purchase a security information and event …
-
Rik Ferguson joins to Forescout as VP of Security Intelligence
Forescout Technologies has appointed Rik Ferguson as VP of Security Intelligence. With a career spanning more than 25 years, including 15 …
-
Get the free Security Intelligence Handbook from Recorded Future
Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their …
-
What Is Security Intelligence? Here’s What Your Business Leaders Want to Know
Every so often, a new phrase or buzzword does the rounds for a bit before it goes off to join the other forgotten buzzwords in the sky, …
-
Cyber Risk Management – Bringing Security Intelligence to The Board
Data breaches are costly. According to a recent Ponemon Institute study, the average breach costs an organisation $3.86 million, writes …
-
Follow the Leaders: 7 Tried-and-True Tips to Get the Most Out of Your Security Analytics
The practice of analyzing security data for detection and response — otherwise known as security analytics (SA) — comes in many forms …
-
Need a Sounding Board for Your Incident Response Plan? Join a Security Community
Incident response teams face myriad uphill battles, such as the cybersecurity skills shortage, floods of security alerts and increasing IT …
-
Don’t Get Caught Off Base: Make Threat Intelligence a Security Imperative
“Offense wins games, but defense wins championships.” You’ve probably heard this old adage with respect to professional sports, but …
-
A Beginner’s Guide to Threat Hunting
Threat hunting is a popular buzzword in cybersecurity at the moment, but what does it mean? How do you know if you should be doing it, and …
-
Not Your Grandfather’s SIEM: 5 Signs That You Should Reconsider Your Current SIEM Deployment
Born next to firewalls, network access controls and vulnerability assessment tools, security information and event management (SIEM) …
●●●