article thumbnail

Detection Engineering and SOC Scalability Challenges (Part 2)

Anton on Security

despite “output-driven SIEM” concept having been invented before 2012 (to be honest, I stole the idea from a Vigilant consultant back in 2012). Note that some of the rules/content may be created by the tool vendor while the rest is created by the customer. What data do we collect?” tends to predate “what do we actually want to do?”

article thumbnail

Today, You Really Want a SaaS SIEM!

Anton on Security

Anton’s old SIEM presentation from 2012 ( source , date: 2012) Before we go, we need to separate the SIEM tool operation difficulties from the SIEM mission difficulties. The mission also evolved a lot over the years from alert aggregation to compliance and reporting to threat detection and response support.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Today, You Really Want a SaaS SIEM!

Security Boulevard

Anton’s old SIEM presentation from 2012. source , date: 2012). The mission also evolved a lot over the years from alert aggregation to compliance and reporting to threat detection and response support. You want to have easier threat detection in cloud environments. examples , examples , examples.

article thumbnail

Only 17% of organizations encrypt at least half of their sensitive cloud data

SC Magazine

A woman speaking on a mobile phone walks past a cloud computing presentation ahead of the CeBIT technology trade fair in 2012. For complete cloud security an organization should encrypt data to protect it in the cloud and also implement real-time threat detection and response.”. Sean Gallup/Getty Images).

article thumbnail

Detection Engineering and SOC Scalability Challenges (Part 2)

Security Boulevard

despite “output-driven SIEM” concept having been invented before 2012 (to be honest, I stole the idea from a Vigilant consultant back in 2012). Note that some of the rules/content may be created by the tool vendor while the rest is created by the customer. What data do we collect?” tends to predate “what do we actually want to do?”

article thumbnail

A Clear and Present Need: Bolster Your Identity Security with Threat Detection and Response

Duo's Security Blog

“It took nearly 11 months (328 days) to identity and contain data breaches resulting from stolen or compromised credentials.” – IBM’s Cost of Data Breach Report 2023 I recently came across a 2012 article from CSO Online , and realized that it has been more than 11 years since the phrase “Identity is the new perimeter” was coined!

article thumbnail

Cobalt Strike Enabled Cyberattacks Skyrocket

SecureWorld News

Cobalt Strike was first released in 2012 to address perceived gaps in an existing Red Team tool, the Metasploit Framework. By 2016, Proofpoint observed Cobalt being used by threat actors. In December 2020, the Cobalt Strike Beacon was discovered to be one of the tools Russian-based threat actors used in the SolarWinds hack.