article thumbnail

How to Make Threat Detection Better?

Anton on Security

I’ve lamented on this a few times, either touching on general difficulties with detection , its uncertainty or highlighting the fragile detections people write. Recent SANS Webinar on Detection By the way, this post ended up being more of “an incomplete thought” then a solid framework , but I hope you forgive me.

article thumbnail

20 Years of SIEM Webinar Q&A

Anton on Security

I recently did this fun SANS webinar titled “Anton Chuvakin Discusses “20 Years of SIEM?—?What’s What’s Next?”” (the seemingly self-centered title was suggested by CardinalOps who organized the webinar). As it is common for SANS webinars , we got a lot of great questions that I feel like re-answering here for posterity.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

[Webinar] When More Is Not Better: Solving Alert Overload

The Hacker News

The increasing volume and sophistication of cyberattacks have naturally led many companies to invest in additional cybersecurity technologies. We know that expanded threat detection capabilities are necessary for protection, but they have also led to several unintended consequences. An upcoming webinar by cybersecurity company

article thumbnail

How to Make Threat Detection Better?

Security Boulevard

I’ve lamented on this a few times, either touching on general difficulties with detection , its uncertainty or highlighting the fragile detections people write. Here, I want to continue the conversation on detection quality. Recent SANS Webinar on Detection. What Are You NOT Detecting?”. More to come!

article thumbnail

SOC Trends ISACA Webinar Q&A

Anton on Security

A few days ago we did a very well-attended webinar focused on the modern Security Operations Center (SOC) approach (see “Trend for the Modern SOC” for a replay link). Fully automated onboard log sources, threat detection rule creation, playbook creation, response, automated integration, and execute. Also see this paper.

Risk 100
article thumbnail

Choosing an MDR provider: Boutique or Big Brand (Part 3)

Jane Frankland

I wove in many data points, including some from Managed Threat Detection and Response firm, e2e-assure, who I’m partnering with, and their latest report, Rejuvenating Cyber Defence Strategies. Different cultural perspectives and experiences foster fresh ideas and alternative solutions when tackling complex cybersecurity challenges.

article thumbnail

SOC Trends ISACA Webinar Q&A

Security Boulevard

A few days ago we did a very well-attended webinar focused on the modern Security Operations Center (SOC) approach (see “Trend for the Modern SOC” for a replay link). Fully automated onboard log sources, threat detection rule creation, playbook creation, response, automated integration, and execute. Also see this paper.

Risk 50