article thumbnail

20 Years of SIEM Webinar Q&A

Anton on Security

I recently did this fun SANS webinar titled “Anton Chuvakin Discusses “20 Years of SIEM?—?What’s What’s Next?”” (the seemingly self-centered title was suggested by CardinalOps who organized the webinar). As it is common for SANS webinars , we got a lot of great questions that I feel like re-answering here for posterity.

article thumbnail

Strengthening Cyber Resilience: A Milestone Partnership

Security Boulevard

Don’t miss our upcoming threat intelligence webinar! This interoperability allows organizations to leverage existing investments in security infrastructure while enhancing their overall cyber defense posture and ensuring a future-proof architecture, capable of adapting and changing with the organization.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Not the Final Answer on NDR in the Cloud …

Anton on Security

As we discussed during this recent webinar , this is not about competing with endpoint or endlessly arguing about what security telemetry is “better.” detect threats with no agents, offer broad coverage from a few points, and be out of band (go and see my old Gartner paper for details). Your main on-premise tool?—?EDR?—?may

article thumbnail

Snort 3: Rearchitected for Simplicity and Performance

Cisco Security

Snort was able to keep up with the packet flow rate because of its lightweight, packet-based architecture. Snort 3 provides a new, flow-based and modular platform to address some of the challenges inherent to the previous packet-based architecture. At that time, gigabit networks were in their infancy.

Firewall 119
article thumbnail

Not the Final Answer on NDR in the Cloud …

Security Boulevard

As we discussed during this recent webinar , this is not about competing with endpoint or endlessly arguing about what security telemetry is “better.” detect threats with no agents, offer broad coverage from a few points, and be out of band (go and see my old Gartner paper for details). Your main on-premise tool?—?EDR?—?may

article thumbnail

Toward a more resilient SOC: the power of machine learning

CyberSecurity Insiders

Machine learning (which is a subset of artificial intelligence, or “AI”)—and in particular, machine learning-powered predictive analytics—are enhancing threat detection and response in the SOC by providing an automated way to quickly analyze and prioritize alerts. Machine learning in threat detection So, what is machine learning (ML)?

article thumbnail

Extending Zero Trust Security to Industrial Networks

Cisco Security

I recently presented a webinar explaining the specific Zero Trust requirements for IoT/OT networks: Endpoint visibility. Threat detection and response. Communications are continuously monitored to detect malicious traffic and abnormal behaviors. Learn more by watching the replay of the webinar I recently presented.

IoT 88