article thumbnail

A Clear and Present Need: Bolster Your Identity Security with Threat Detection and Response

Duo's Security Blog

“It took nearly 11 months (328 days) to identity and contain data breaches resulting from stolen or compromised credentials.” – IBM’s Cost of Data Breach Report 2023 I recently came across a 2012 article from CSO Online , and realized that it has been more than 11 years since the phrase “Identity is the new perimeter” was coined!

article thumbnail

Why Your Security Data Lake Project Will … Well, Actually …

Anton on Security

Note that this blog was informed by my observations of the previous wave of security data lakes ( dating back to 2012 ) and related attempts by organizations to build security data science capabilities. So, in 2012, we said : “Finally, “collect once?—?analyze However, we are not living in 2012 or 2018 anymore?—?we So, has it?

Big data 202
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Detection Engineering and SOC Scalability Challenges (Part 2)

Anton on Security

despite “output-driven SIEM” concept having been invented before 2012 (to be honest, I stole the idea from a Vigilant consultant back in 2012). Note that some of the rules/content may be created by the tool vendor while the rest is created by the customer. What data do we collect?” tends to predate “what do we actually want to do?”

article thumbnail

Today, You Really Want a SaaS SIEM!

Security Boulevard

Anton’s old SIEM presentation from 2012. source , date: 2012). The mission also evolved a lot over the years from alert aggregation to compliance and reporting to threat detection and response support. You want to have easier threat detection in cloud environments. examples , examples , examples.

article thumbnail

Today, You Really Want a SaaS SIEM!

Anton on Security

Anton’s old SIEM presentation from 2012 ( source , date: 2012) Before we go, we need to separate the SIEM tool operation difficulties from the SIEM mission difficulties. The mission also evolved a lot over the years from alert aggregation to compliance and reporting to threat detection and response support.

article thumbnail

Exploring the dynamic landscape of cybersecurity threats

Security Boulevard

In 2012, there was just one CVE, whereas in 2023, there were 42 CVEs. This significant rise had a notable impact on our product, influencing its detection. Recently, we extended these capabilities, launching a new, multi-layered OAuth protection package that can detect attempts to exploit OAuth and proactively fix vulnerabilities.

article thumbnail

SOC Technology Failures?—?Do They Matter?

Anton on Security

I lamented on this back in 2012 , and this affliction has not truly subsided. Finally, the tool may “scale physically, but not economically” i.e. it will run at scale you need, but nobody can realistically afford it … Tool deployed and then not operationalized sounds like a process failure, or a people failure.