article thumbnail

SIEM Content, False Positives and Engineering (Or Not) Security

Anton on Security

Related posts: “Detection as Code? No, Detection as COOKING!” “How How to Measure Threat Detection Quality for an Organization?” As we learned , SIEM still matters in 2023.

article thumbnail

Anton and The Great XDR Debate, Part 2

Anton on Security

In most cases, my instinctive reaction was to argue with them, because I very clearly saw “SIEM” (or pieces of SIEM ) in what they showed me … Admittedly, my thinking has been colored by SIEM since 2002 when I joined my first SIEM vendor (a SIM vendor, to be precise).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Today, You Really Want a SaaS SIEM!

Anton on Security

And let me tell you … that “n” is pretty damn large since my first involvement with SIEM in January 2002 (!)?—? The mission also evolved a lot over the years from alert aggregation to compliance and reporting to threat detection and response support. Let’s explore this topic for the (n+1)-th time. examples , examples , examples.

article thumbnail

Do You Trust Your SIEM?

Anton on Security

you trust the SIEM to map the events to the correct category and not to confuse “password guessing” with “logon failure” or whatever You then trust that the detection logic (rules) is written correctly so that nobody mistyped “context.asset.vulnerability.severity” as “asset.context.vulnerability.severity” in a rule they wrote.

Passwords 257
article thumbnail

Today, You Really Want a SaaS SIEM!

Security Boulevard

And let me tell you … that “n” is pretty damn large since my first involvement with SIEM in January 2002 (!)?—? The mission also evolved a lot over the years from alert aggregation to compliance and reporting to threat detection and response support. You want to have easier threat detection in cloud environments.

article thumbnail

Quantum computing brings new security risks: How to protect yourself

CyberSecurity Insiders

To put this in perspective, it took a group of 300,000 people and four years of work to crack a 64-bit key in 2002. Implement managed threat detection. The best way to ensure that your cybersecurity ecosystem remains intact is to implement managed threat detection through a trusted company.

Risk 134
article thumbnail

Kill SOC Toil, Do SOC Eng

Anton on Security

Otherwise, 30+ years of SOC work and we’re still facing the age-old challenges we had in the past (believe it or not, “too many [IDS] alerts” was a SOC challenge in 2002!). We think that the largest current and future challenges in Security Operations can be solved with this approach.