article thumbnail

Why is Threat Detection Hard?

Anton on Security

While creating a recent presentation, I needed a slide on “threat detection is hard.” And it got me thinking, why is threat detection so hard for so many organizations today? This means we are “celebrating” ~35 years of cyber threat detection. This does make detection even harder. Action items?

article thumbnail

The XDR Revolution: Threat Detection and Response for All!

Dark Reading

In this webinar replay, Omdia outlines the ways in which XDR facilitates faster and easier threat detection and response, and key points organizations should consider when evaluating XDR technology.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

20 Years of SIEM Webinar Q&A

Anton on Security

I recently did this fun SANS webinar titled “Anton Chuvakin Discusses “20 Years of SIEM?—?What’s What’s Next?”” (the seemingly self-centered title was suggested by CardinalOps who organized the webinar). As it is common for SANS webinars , we got a lot of great questions that I feel like re-answering here for posterity.

article thumbnail

[Webinar] When More Is Not Better: Solving Alert Overload

The Hacker News

The increasing volume and sophistication of cyberattacks have naturally led many companies to invest in additional cybersecurity technologies. We know that expanded threat detection capabilities are necessary for protection, but they have also led to several unintended consequences. An upcoming webinar by cybersecurity company

article thumbnail

SOC Trends ISACA Webinar Q&A

Anton on Security

A few days ago we did a very well-attended webinar focused on the modern Security Operations Center (SOC) approach (see “Trend for the Modern SOC” for a replay link). Fully automated onboard log sources, threat detection rule creation, playbook creation, response, automated integration, and execute. Also see this paper.

Risk 100
article thumbnail

SOC Trends ISACA Webinar Q&A

Security Boulevard

A few days ago we did a very well-attended webinar focused on the modern Security Operations Center (SOC) approach (see “Trend for the Modern SOC” for a replay link). Fully automated onboard log sources, threat detection rule creation, playbook creation, response, automated integration, and execute. Also see this paper.

Risk 50
article thumbnail

Choosing an MDR provider: Boutique or Big Brand (Part 3)

Jane Frankland

Having begun by discussing the first core feature, technology, I then focused on the second core feature, contract terms. I wove in many data points, including some from Managed Threat Detection and Response firm, e2e-assure, who I’m partnering with, and their latest report, Rejuvenating Cyber Defence Strategies.