article thumbnail

BrandPost: Assessing Network Analysis and Visibility Solutions for Zero Trust

CSO Magazine

Zero-trust principles foster more effective threat detection because they reject the notion that security happens at the perimeter and that all network traffic is legitimate traffic. The rising trend of zero trust implementation is a direct reaction to increasingly sophisticated cyberattacks.

article thumbnail

Today, You Really Want a SaaS SIEM!

Anton on Security

The mission also evolved a lot over the years from alert aggregation to compliance and reporting to threat detection and response support. Anton’s old SIEM presentation from 2009 ( source , date: 2009) So, yes, even today’s SIEM tools produce the customer reactions I mentioned above. and then magic happens.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Today, You Really Want a SaaS SIEM!

Security Boulevard

The mission also evolved a lot over the years from alert aggregation to compliance and reporting to threat detection and response support. Anton’s old SIEM presentation from 2009. source , date: 2009). You want to have easier threat detection in cloud environments. and then magic happens. And open source?—?in

article thumbnail

Group-IB Thwarts Chinese Tonto Team Cyberattack

SecureWorld News

Group-IB describes Tonto Team: "Tonto Team (aka HeartBeat, Karma Panda, CactusPete, Bronze Huntley, Earth Akhlut) is a cyber espionage threat actor that is believed to originate from China. The threat actor has been targeting government, military, energy, financial, educational, healthcare, and technology sector companies since 2009.

Phishing 101
article thumbnail

Lazarus campaign TTPs and evolution

CyberSecurity Insiders

Since 2009, the known tools and capabilities believed to have… Posted by: Fernando Martinez. Key Takeaways: Lazarus has been identified targeting defense contractors with malicious documents. There is a high emphasis on renaming system utilities (Certutil and Explorer) to obfuscate the adversary’s activities (T1036.003).

article thumbnail

FTC extends deadline by six months for compliance with some changes to financial data security rules

CyberSecurity Insiders

Since 2009, more than 6,600 distinct cryptocurrencies have been released. Since credit card fraud can often be enacted during unsecured store transactions, the FTC is determined to bolster security measures at every level.

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

He has 15 years of cybersecurity technical product and program management experience delivering cyber solutions and developing thought leadership across multiple verticals, with a focus on threat detection, threat exposure management, response/remediation and protection.