article thumbnail

MY TAKE: How advanced automation of threat intel sharing has quickened incident response

The Last Watchdog

Related: Ground zero for cybersecurity research Having covered the cybersecurity industry for the past 15 years, it’s clear to me that there are two primary reasons. At the same time, digital transformation has redoubled the complexity of company networks, catapulting us from Big Data to Very Big Data.

Big data 153
article thumbnail

Hush – This Data Is Secret

CyberSecurity Insiders

Is There Ever Too Much Data? As a security practitioner, you know that businesses are fuelled not only by people but by data. Years ago, the phrase β€œBig Data” was a new, innovative way to gain a business advantage. Now, big data is the norm. How SSCP Certification helps.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Six-figure GDPR privacy fines reinforce business case for advanced SIEM, UEBA tools

The Last Watchdog

Fortunately, there is a cottage industry of cybersecurity vendors , Exabeam among them, engaged in proactively advancing ways for SOC analysts to extract more timely and actionable threat intelligence from their security information and event management ( SIEM ) and user and entity behavior ( UEBA ) systems. We spoke at Black Hat USA 2019.

Big data 153
article thumbnail

An Optimistic Outlook for 2022: Cloud Security Vulnerabilities Are 100% Preventable

CyberSecurity Insiders

And so you must automate to relieve security professionals from having to spend their days manually monitoring for misconfigurations and enable developers to write code in a way that is flexible, that can be changed over time, and that can incorporate new knowledge, such as the latest big data breach that makes news headlines.

article thumbnail

3 Things Leaders Often Miss When Trying to Get More Women into Tech

Jane Frankland

Most people know I’m driven to build a safer, happier and more prosperous world, and that one of the ways I do this is by creating awareness around how to get more women into male dominated industries, like tech and cybersecurity. There are plenty of women looking to re-skill and join the tech or cybersecurity workforce.

article thumbnail

The Hacker Mind Podcast: Incident Response in the Cloud

ForAllSecure

There’s been a major data breach, and you’re booked on the next night flight out, at 6am. I've seen over my last 16 odd years in cybersecurity. It’s 3am and the call comes in. I'll see you in a few days. CAMPBELL: The cloud is a real enabler.