Remove 2023 Remove Blog Remove Technology Remove Threat Detection
article thumbnail

Debating SIEM in 2023, Part 2

Anton on Security

So, we went through “Debating SIEM in 2023, Part 1” , now let’s debate a bit more. At this point, everybody who didn’t “rage stop” reading it should be convinced that yes, SIEM does matter in 2023. Debating SIEM in 2023, Part 1 But why? Let’s start with this: why should anyone buy an SIEM tool in 2023? Conclusion !

article thumbnail

Debating SIEM in 2023, Part 2

Security Boulevard

So, we went through “Debating SIEM in 2023, Part 1” , now let’s debate a bit more. At this point, everybody who didn’t “rage stop” reading it should be convinced that yes, SIEM does matter in 2023. Debating SIEM in 2023, Part 1 But why? Let’s start with this: why should anyone buy an SIEM tool in 2023? Conclusion !

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Unmasking the Cracks of Today’s Cyber Defence

Jane Frankland

However, new research from e2e-assure has revealed that few organisations are taking full advantage of security technologies available today. I’ve partnered with e2e-assure, a leading managed threat detection and response firm as I believe in their brand. This is unsurprising considering today’s challenging business landscape.

CISO 147
article thumbnail

Choosing an MDR Provider: Boutique or Big Brand (Part 1)

Jane Frankland

MDR providers offer an all-in-one solution for organisations that combines people, processes, and technologies to strengthen security measures and reduce risk exposure. They include monitoring for potential threats and incidents, responding to confirmed breaches, and providing support for incident investigation processes.

article thumbnail

Tackling Cyber Threats: Is AI Cybersecurity Our Only Hope?

Jane Frankland

On one hand, AI has been hailed as a game-changing technology with the potential to transform industries and improve our daily lives. On the other hand, it’s been portrayed as a potential threat to our privacy, security, creativity and even mankind’s existence. One of its major limitations is its reliance on data.

article thumbnail

Detection Engineering and SOC Scalability Challenges (Part 2)

Anton on Security

This blog series was written jointly with Amine Besson, Principal Cyber Engineer, Behemoth CyberDefence and one more anonymous collaborator. Detection Engineering is Painful — and It Shouldn’t Be (Part 1) Contrary to what some may think, a detection and response (D&R) success is more about the processes and people than about the SIEM.

article thumbnail

NetSPI Wins Big with Breach and Attack Simulation

NetSpi Executives

Since the launch of our Breach and Attack Simulation (BAS) enhancements in 2022 , we’ve helped companies spanning all sizes and sectors improve their threat detection capabilities and move away from a ‘secure by default’ mindset that has rendered ineffective against the evolving and complex threat landscape.