article thumbnail

NEW TECH: Exabeam positions SIEM technology to help protect IoT, OT systems

The Last Watchdog

Security information and event management systems — SIEMs — have been around since 2005, but their time may have come at last. Related: Digital Transformation gives SIEMs a second wind After an initial failure to live up to their overhyped potential, SIEMs are perfectly placed to play a much bigger role today.

IoT 179
article thumbnail

NEW TECH: Exabeam retools SIEMs; applies credit card fraud detection tactics to network logs

The Last Watchdog

Security information and event management, or SIEM, could yet turn out to be the cornerstone technology for securing enterprise networks as digital transformation unfolds. Related: Autonomous vehicles are driving IoT security innovation. Exabeam is a bold upstart in the SIEM space. Poor usage.

Big data 157
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARED INTEL: FireMon survey shows security lags behind fast pace of hybrid cloud deployments

The Last Watchdog

Yet ignorance persists when it comes to a momentous challenge at hand: how to go about tapping the benefits of digital transformation while also keeping cyber exposures to a minimum level. One big muddle revolves around the so-called “ shared responsibility ” security model, espoused by Amazon, Microsoft and Google.

article thumbnail

GUEST ESSAY: Here’s why managed security services — MSS and MSSP — are catching on

The Last Watchdog

Digital Transformation. MSS/PSS providers must take advantage of digital transformation initiatives by observing clients’ current situations and being trusted advisors through consulting and value-added services to help them embrace digitalization […]. Onboarding and operational capacity.

Marketing 247
article thumbnail

9 Considerations For Hong Kong Banks To Address The STDB Guidelines

Thales Cloud Protection & Licensing

The digital transformation initiatives have shifted the technology landscape and introduced new threats and risks. The Live Data Transformation extension is available for CipherTrust Transparent Encryption, providing zero-downtime encryption and data rekeying.

Banking 114
article thumbnail

Hackers Also Have Financial Reporting And Quotas :)

Security Boulevard

The spending on cybersecurity tools, security staff, upgrade of the security operations center, and security awareness training is an aggregation of efforts to reduce the organization’s overall risk posture. Not every threat or possible cyber event can be protected.

Hacking 84