5 min read
Security Events Everywhere and None Worth Investigating
If you’re in security, you probably have some tool somewhere showing a lot of events. Verizon Data Breach Investigation Reports consistently show...
Read MoreA 25+ year industry veteran, David is a cybersecurity strategist and platform evangelist at Netenrich. Most recently, he was Principal Architect at Securonix. Prior companies include Accuvant, Dell, Fortinet, and IBM. He has consulted to Microsoft, Apple, Visa, Chevron, and Amex and has authored publications and articles on cybersecurity. He holds a BSBA from the University of Texas at Dallas and and holds numerous certifications.
5 min read
If you’re in security, you probably have some tool somewhere showing a lot of events. Verizon Data Breach Investigation Reports consistently show...
Read More3 min read
Security information and event management (SIEM) and security orchestration, automation, and response (SOAR) are complementary solutions.
4 min read
Security information and event management (SIEM) is about collecting, detecting, and responding. That is, collecting data into a single pane of glass...
2 min read
At Netenrich, part of what we’re doing is looking "left of bang." Bang (!) is geek speak for when we see detonation of malicious content. What...
2 min read
Threats start with risks. Understanding risks is really just situational awareness. And that awareness leads to faster and better detection. The...
3 min read
"UEBA, it’s just a use case." – Netenrich CISO Chris Morales
He’s not wrong. But I’d take it a step further. User entity and behavior analytics (...
4 min read
One vendor uses 5 patterns, the other uses 500 rules. What’s better?
Anyone who has configured a SIEM or UEBA (e.g., QRadar, Splunk, ArcSight,...
The best source of information for Security, Networks, Cloud, and ITOps best practices. Join us.