Skip to the main content.
Partner Programs
Technology Partners
Featured Report

gartner-hype-cycle-for-security-operations-report-2024

 

David Swift

A 25+ year industry veteran, David is a cybersecurity strategist and platform evangelist at Netenrich. Most recently, he was Principal Architect at Securonix. Prior companies include Accuvant, Dell, Fortinet, and IBM. He has consulted to Microsoft, Apple, Visa, Chevron, and Amex and has authored publications and articles on cybersecurity. He holds a BSBA from the University of Texas at Dallas and and holds numerous certifications.

Security Events Everywhere and None Worth Investigating

Security Events Everywhere and None Worth Investigating

If you’re in security, you probably have some tool somewhere showing a lot of events. Verizon Data Breach Investigation Reports consistently show...

Keep reading
SIEM vs. SOAR: The Right Security Tool

SIEM vs. SOAR: The Right Security Tool

Security information and event management (SIEM) and security orchestration, automation, and response (SOAR) are complementary solutions. 

Keep reading
SIEM 101 – Best Practices for Implementation

SIEM 101 – Best Practices for Implementation

Security information and event management (SIEM) is about collecting, detecting, and responding. That is, collecting data into a single pane of glass...

Keep reading
Looking “Left of Bang” to Increase Situational Awareness

Looking “Left of Bang” to Increase Situational Awareness

At Netenrich, part of what we’re doing is looking "left of bang." Bang (!) is geek speak for when we see detonation of malicious content. What...

Keep reading
Situational Awareness Is Key to Faster, Better Threat Detection

Situational Awareness Is Key to Faster, Better Threat Detection

Threats start with risks. Understanding risks is really just situational awareness. And that awareness leads to faster and better detection. The...

Keep reading
UEBA, It's Just a Use Case

UEBA, It's Just a Use Case

"UEBA, it’s just a use case." – Netenrich CISO Chris Morales

He’s not wrong. But I’d take it a step further. User entity and behavior analytics (...

Keep reading

As seen on

Google-Cloud-logo Dice logo security-magazine-logo security-week-logo security-boulevard-logo New-SC-Media-Logo dark-reading-logo theCyberWire-logo the-hacker-news-logo mssp-alert-logo channel-futures-logo threatpost-logo PCMag-logo informationweek-logo wired-logo the-record-logo-svg marketwatch-logo ema-logo VentureBeat_logo-1 vmblog.com-logo channel-insider-logo LinuxInsider_logo