Remove CISO Remove Engineering Remove Threat Detection
article thumbnail

LW ROUNDTABLE — How 2024’s cyber threats will transform the security landscape in 2025

The Last Watchdog

Hurd Wayne Hurd , VP of Sales, Luminys Video Surveillance as a Service (VSaaS) advancements will provide more accurate threat detection that allows security teams to focus on real risks, minimizing false alarms. Security teams will need to address the unique risks posed using LLMs in mission critical environments. The hard part?

article thumbnail

Anton’s Security Blog Quarterly Q1 2025

Anton on Security

Dall-E security bloggingimage Top 10 posts with the most lifetime views (excluding paper announcement blogs, Medium postsonly): Security Correlation Then and Now: A Sad Truth AboutSIEM Can We Have Detection asCode? A SOC Tried To Detect Threats in the Cloud You Wont Believe What HappenedNext Top 10 SIEM Log Sources in Real Life?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSAC Fireside Chat: Operationalizing diverse security to assure customers, partners–and insurers

The Last Watchdog

It was about stopping malicious code and blocking known threats. It’s an engine of real-time telemetry — not just threat detection, but evidence of operational resilience. The company has used neural networks in its threat modeling pipeline since the late 1990s, long before today’s generative wave. MSSPs need it.

Insurance 147
article thumbnail

LW ROUNDTABLE:  Predictive analytics, full-stack visualization to solidify cyber defenses in 2025

The Last Watchdog

FIPS-203 enables legal PQC deployment, prompting CISOs to overhaul encryption strategies. Organizations face rising risks of AI-driven social engineering and personal device breaches. Organizations must invest in AI security training, focusing on foundational knowledge and emerging threats like prompt injection.

Risk 173
article thumbnail

'SIEM Sprawl' Makes It Tough for Security Teams to Detect What Matters

SecureWorld News

million total log sources, more than 23,000 distinct log sources, more than 13,000 unique detection rules, and hundreds of production SIEM environments, including Splunk, Microsoft Sentinel, IBM QRadar, CrowdStrike Logscale, and Google SecOps. What's clear is that the traditional approach to detection engineering is broken.

article thumbnail

News alert: Aptori’s AI-driven platform reduces risk, ensures compliance — now on Google Marketplace

The Last Watchdog

Acting as a proactive teammate, Aptori’s AI Security Engineer works alongside developers and security teams to identify security weaknesses, assess risk, and implement fixes in real-time. The result is deeper coverage and more precise security insights.

Risk 130
article thumbnail

GUEST ESSAY: Cisco-Splunk merger will boost Snowflake – here’s how security teams can benefit.

The Last Watchdog

Splunk’s inability to migrate to a modern cloud-native architecture makes it difficult to take advantage of these cost-saving benefits or implement advanced data science use cases critical for threat detection. Impactful analysis A decoupled, purpose-built threat detection platform can work across distributed data lake architectures.