Remove 2012 Remove Technology Remove Threat Detection
article thumbnail

SOC Technology Failures?—?Do They Matter?

Anton on Security

SOC Technology Failures?—?Do img src: [link] Most failed Security Operations Centers (SOCs) that I’ve seen have not failed due to a technology failure. Let’s stick to mostly technology focused failures. I lamented on this back in 2012 , and this affliction has not truly subsided. Do They Matter? Hence this blog was born.

article thumbnail

Why Your Security Data Lake Project Will … Well, Actually …

Anton on Security

Note that this blog was informed by my observations of the previous wave of security data lakes ( dating back to 2012 ) and related attempts by organizations to build security data science capabilities. So, in 2012, we said : “Finally, “collect once?—?analyze However, we are not living in 2012 or 2018 anymore?—?we So, has it?

Big data 202
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Detection Engineering and SOC Scalability Challenges (Part 2)

Anton on Security

Detection Engineering is Painful — and It Shouldn’t Be (Part 1) Contrary to what some may think, a detection and response (D&R) success is more about the processes and people than about the SIEM. Note that some of the rules/content may be created by the tool vendor while the rest is created by the customer. What data do we collect?”

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Isovalent Cloud security 2020 Private Illumio Cloud security 2015 Private SignalFx Monitoring 2015 Acquired: Splunk CipherCloud Cloud security 2012 Acquired: Lookout Lookout Mobile security 2011 Private. a16z Investments. Bessemer Venture Partners. Also read : Addressing Remote Desktop Attacks and Security.

article thumbnail

SOC Technology Failures?—?Do They Matter?

Security Boulevard

SOC Technology Failures?—?Do Most failed Security Operations Centers (SOCs) that I’ve seen have not failed due to a technology failure. Let’s stick to mostly technology focused failures. An astute reader will notice that in the list below, some of the purported technology failures are really process failures in disguise.

article thumbnail

Only 17% of organizations encrypt at least half of their sensitive cloud data

SC Magazine

A woman speaking on a mobile phone walks past a cloud computing presentation ahead of the CeBIT technology trade fair in 2012. For complete cloud security an organization should encrypt data to protect it in the cloud and also implement real-time threat detection and response.”. Sean Gallup/Getty Images).

article thumbnail

Why Your Security Data Lake Project Will … Well, Actually …

Security Boulevard

Note that this blog was informed by my observations of the previous wave of security data lakes ( dating back to 2012 ) and related attempts by organizations to build security data science capabilities. So, in 2012, we said : “Finally, “collect once?—?analyze However, we are not living in 2012 or 2018 anymore?—?we So, has it?