Skip to the main content.
Partner Programs
Technology Partners
Featured Report

Gartner Autonomous SOC Guide

 

David Swift

A 25+ year industry veteran, David is a cybersecurity strategist and platform evangelist at Netenrich. Most recently, he was Principal Architect at Securonix. Prior companies include Accuvant, Dell, Fortinet, and IBM. He has consulted to Microsoft, Apple, Visa, Chevron, and Amex and has authored publications and articles on cybersecurity. He holds a BSBA from the University of Texas at Dallas and and holds numerous certifications.

5 min read

Security Events Everywhere and None Worth Investigating

If you’re in security, you probably have some tool somewhere showing a lot of events. Verizon Data Breach Investigation Reports consistently show...

Read More
SIEM vs. SOAR: The Right Security Tool

3 min read

SIEM vs. SOAR: The Right Security Tool

Security information and event management (SIEM) and security orchestration, automation, and response (SOAR) are complementary solutions. 

Read More
SIEM 101 – Best Practices for Implementation

4 min read

SIEM 101 – Best Practices for Implementation

Security information and event management (SIEM) is about collecting, detecting, and responding. That is, collecting data into a single pane of glass...

Read More
Looking “Left of Bang” to Increase Situational Awareness

2 min read

Looking “Left of Bang” to Increase Situational Awareness

At Netenrich, part of what we’re doing is looking "left of bang." Bang (!) is geek speak for when we see detonation of malicious content. What...

Read More
Situational Awareness Is Key to Faster, Better Threat Detection

2 min read

Situational Awareness Is Key to Faster, Better Threat Detection

Threats start with risks. Understanding risks is really just situational awareness. And that awareness leads to faster and better detection. The...

Read More
UEBA, It's Just a Use Case

3 min read

UEBA, It's Just a Use Case

"UEBA, it’s just a use case." – Netenrich CISO Chris Morales

He’s not wrong. But I’d take it a step further. User entity and behavior analytics (...

Read More
Want to Optimize Threat Detection & Response? 5 Patterns vs. 500 Rules

4 min read

Want to Optimize Threat Detection & Response? 5 Patterns vs. 500 Rules

One vendor uses 5 patterns, the other uses 500 rules. What’s better?

Anyone who has configured a SIEM or UEBA (e.g., QRadar, Splunk, ArcSight,...

Read More

As seen on

Google-Cloud-logo Dice logo security-magazine-logo security-week-logo security-boulevard-logo New-SC-Media-Logo dark-reading-logo theCyberWire-logo the-hacker-news-logo mssp-alert-logo channel-futures-logo threatpost-logo PCMag-logo informationweek-logo wired-logo the-record-logo-svg marketwatch-logo ema-logo VentureBeat_logo-1 vmblog.com-logo channel-insider-logo LinuxInsider_logo