article thumbnail

How to Measure Threat Detection Quality for an Organization?

Anton on Security

Sometimes I write blog posts with answers. In other cases, I write blog posts with questions. This particular blog post covers a topic where I feel I am in the “discovering questions” phase. Here I’m talking about the quality of the entire detection capability of an organization. In other words, don’t expect answers?—?but

article thumbnail

How to Measure Threat Detection Quality for an Organization?

Security Boulevard

Sometimes I write blog posts with answers. In other cases, I write blog posts with questions. This particular blog post covers a topic where I feel I am in the “discovering questions” phase. So, in recent weeks, I had a few simultaneous conversations with various people that focused on the quality of threat detection.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Cisco-Splunk merger will boost Snowflake – here’s how security teams can benefit.

The Last Watchdog

Splunk’s inability to migrate to a modern cloud-native architecture makes it difficult to take advantage of these cost-saving benefits or implement advanced data science use cases critical for threat detection. The Cisco acquisition shall exacerbate these challenges and speed up the adoption of security data lakes.

article thumbnail

Report Finds Over 50% of Security Practitioners Are Unhappy With Current SIEM Vendor

CyberSecurity Insiders

Security industry blogs, magazines, and websites frequently report that many security teams are frustrated by the limitations of their SIEM tool. Analysts find dealing with data collected from numerous hosts within an enterprise to be a daunting task.

article thumbnail

6 Business functions that will benefit from cybersecurity automation

CyberSecurity Insiders

This blog was written by an independent guest blogger. Cybersecurity automation gives organizations the ability to perform threat detection and incident response at scale. Many security professionals spend hours each day manually administering tools to protect enterprise data. Data privacy.

article thumbnail

How your business can benefit from Cybersecurity automation

CyberSecurity Insiders

This blog was written by an independent guest blogger. Cybersecurity automation gives organizations the ability to perform threat detection and incident response at scale. Many security professionals spend hours each day manually administering tools to protect enterprise data. Data privacy.

article thumbnail

More SRE Lessons for SOC: Simplicity Helps Security

Anton on Security

Phil’s 8 megatrends blog reminds us about this by calling one of his cloud megatrends “Simplicity: Cloud as an abstraction machine.” We can add: also for security and threatdetectability” and “investigability” (can we just say observability ?). In detection content? Metrics and associated data collection?