Remove solution secure-multi-cloud-multi-siem
article thumbnail

Does moving to the cloud mean compromising on security?

Security Boulevard

Cloud security means multiple teams with a shared responsibility. The transition to cloud computing is an evolution that many organisations are still undertaking to improve efficiency, scalability, and flexibility in their operations. Clearly, the cloud is not the panacea some thought it would be.

article thumbnail

20 Years of SIEM Webinar Q&A

Anton on Security

I recently did this fun SANS webinar titled “Anton Chuvakin Discusses “20 Years of SIEM?—?What’s The “better EDR” crowd keeps taking past “integrated SIEM-like thing” crowd who both talk past “EDR+NDR” crowd. Q: How do you define ‘XDR’ and what role does SIEM play here? Does it depend on which vendor/solution is chosen?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Five Ways to Configure a SIEM for Accurate Threat Detection

eSecurity Planet

A security information and event management (SIEM) system is about as complicated as a security tool can get, pulling in log and threat data from a wide range of sources to look for signs of a cyber attack. People are struggling with trying to understand, ‘Am I really seeing everything from the cloud that I need to?'”

article thumbnail

RSA 2023: Not Under the GenAI Influence Yet!

Anton on Security

Security business is booming! Stop Glorifying Threat Actors, People! :-) In my traditional post-RSA manner, let’s go through the topic areas I care about (translation: not pre/post/in/on/through/over quantum) Security operations Let’s look at my favorite topic: security operations / detection and response. Not at all.

article thumbnail

IaaS Security: Top 8 Issues & Prevention Best Practices

eSecurity Planet

Infrastructure as a service security is a concept that assures the safety of organizations’ data, applications, and networks in the cloud. Understanding the risks, advantages, and best practices connected with IaaS security is becoming increasingly important as enterprises shift their infrastructure to the cloud.

article thumbnail

DHS CISA alert provides recommendations on securing Office 365 installs

Security Affairs

The US DHS CISA agency issued a new alert that includes recommendations on how organizations should properly secure Microsoft Office 365 installs. According to the Agency, many organizations contine to deploy their infrastructure without implement best security practices and exposing them to the risk of cyber attacks.

article thumbnail

5 Best Bot Protection Solutions and Software for 2023

eSecurity Planet

The main purpose of bot protection is to ensure the security and integrity of online systems as well as to prevent unfair or harmful activities such as spamming, click fraud, scraping, and credential stuffing. The company offers real-time detection and mitigation of bots using behavioral analysis and machine learning algorithms.