Remove Digital transformation Remove Engineering Remove Threat Detection
article thumbnail

Streamlining detection engineering in security operation centers

SecureList

Inefficient use of data for correlation in many cases, relevant data is available to detect threats, but there are no correlation rules in place to leverage it for threat detection. This article focuses solely on SIEM-based detection management. This only leads to the degradation of the log visibility matrix.

article thumbnail

Anton’s Security Blog Quarterly Q1 2025

Anton on Security

Dall-E security bloggingimage Top 10 posts with the most lifetime views (excluding paper announcement blogs, Medium postsonly): Security Correlation Then and Now: A Sad Truth AboutSIEM Can We Have Detection asCode? A SOC Tried To Detect Threats in the Cloud You Wont Believe What HappenedNext Top 10 SIEM Log Sources in Real Life?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Krispy Kreme Cyber Attack a Wake-Up Call for the Food Industry

SecureWorld News

The shift to digital experiences and customer service in industries that were historically only brick-and-mortar underscores how rapid digital transformation expands the attack surface for cybercriminals. This can help your organization establish a robust risk management program that keeps pace with your rapid digital change.

article thumbnail

News alert: Aptori’s AI-driven platform reduces risk, ensures compliance — now on Google Marketplace

The Last Watchdog

Acting as a proactive teammate, Aptori’s AI Security Engineer works alongside developers and security teams to identify security weaknesses, assess risk, and implement fixes in real-time. Aptori can now securely scale and support customers on their digital transformation journeys.

Risk 130
article thumbnail

LW ROUNDTABLE — How 2024’s cyber threats will transform the security landscape in 2025

The Last Watchdog

Hurd Wayne Hurd , VP of Sales, Luminys Video Surveillance as a Service (VSaaS) advancements will provide more accurate threat detection that allows security teams to focus on real risks, minimizing false alarms. Security teams will need to address the unique risks posed using LLMs in mission critical environments.

article thumbnail

The Impact of AI on Social Engineering Cyber Attacks

SecureWorld News

Social engineering attacks have long been a threat to businesses worldwide, statistically comprising roughly 98% of cyberattacks worldwide. Given the much more psychologically focused and methodical ways that social engineering attacks can be conducted, it makes spotting them hard to do.

article thumbnail

Anton’s Security Blog Quarterly Q3 2024

Anton on Security

Beware: Clown-grade SOCs Still Abound Detection Engineering is Painful — and It Shouldn’t Be (Part 1) [now a 10 post series, not yet finished…] Why is Threat Detection Hard? Revisiting the Visibility Triad for 2020” “ Beware: Clown-grade SOCs Still Abound ” “Why is Threat Detection Hard?” “A