Remove Architecture Remove Blog Remove CISO Remove Threat Detection
article thumbnail

GUEST ESSAY: Cisco-Splunk merger will boost Snowflake – here’s how security teams can benefit.

The Last Watchdog

Splunk’s inability to migrate to a modern cloud-native architecture makes it difficult to take advantage of these cost-saving benefits or implement advanced data science use cases critical for threat detection. To achieve decoupling, organizations need to implement a unified detection layer and adopt the right AI tooling.

article thumbnail

Unmasking the Cracks of Today’s Cyber Defence

Jane Frankland

In this blog, I’ll be exploring some of the main cracks in current cybersecurity defence approaches specifically around Secure Operation Centres (SOCs) and the value that CISOs and ITDMs are currently getting from their internal teams and third-party providers. You know economic downturns incentivise cybercriminals.

CISO 147
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: How SIEMS, UEBAs fall short in today’s turbulent threat landscape

The Last Watchdog

The painful impact of cyber attacks on businesses is worsening despite advances in technology aimed at protecting enterprises from malicious network traffic, insider threats, malware, denial of service attacks and phishing campaigns. This has left many CISOs questioning if today’s incumbent cybersecurity solutions are enough.

CISO 140
article thumbnail

Transformational Thinking: Why a Focus on Outcomes Drives Zero Trust Progress

Duo's Security Blog

Tired: Zero Trust is a Journey Wired: Zero Trust is a Transformation Inspired: Zero Trust is About Relationships So many CIOs and CISOs I engage with are over it. Adopting a zero-trust architecture across your enterprise is transformational. Are we rolling the same boulder up the hill every day, or are we making progress?

article thumbnail

Lapsus$ Attack on Okta: How to Evaluate the Impact to your Organization

Security Boulevard

According to a blog penned by the Okta CISO, here’s what happened: On January 20 2022, a third-party customer support engineer working for Okta had their account compromised by Lapsus$. SOC Detection Rules for Okta. The first known extortion attempt by Lapsus$ included the Brazil Health Ministry in December of 2021.

article thumbnail

The Rise of Resilience – Security in 2021 and Beyond

Cisco Security

According to Mick Jenkins, CISO at Brunel University London , “The streamlined platform approach has been quite easy for our security analysts to work with, and we’ve already seen evidence of shortened threat detection times.”. New platform innovations. And watch CEO Chuck Robbins’ keynote if you missed it!

Firewall 102
article thumbnail

Top MDR Services for 2021

eSecurity Planet

Despite the similarity in name to endpoint detection and response (EDR) technology, MDR providers are more like general managed security service providers (MSSPs) , operating on all layers of an organization’s infrastructure, including the network, endpoints, applications and other IT resources. Secureworks. Focus on collaboration.