Remove Architecture Remove Big data Remove Engineering
article thumbnail

RSAC Fireside Chat: Bedrock Security introduces advanced approach to “commoditize” data discovery

The Last Watchdog

At RSAC 2024 , I visited with Pranava Adduri , co-founder and CEO of Bedrock Security which has just rolled out its AI Reasoning (AIR) Engine to help solve this problem in a bold new way. This “commoditization” of data discovery, as Adduri puts it, slashes the cost of data discovery at scale.

Big data 162
article thumbnail

SHARED INTEL Q&A: Everything the Cisco-Splunk merger tells us about the rise of SIEMs

The Last Watchdog

We use machine learning models on open choice big data lakes to detect unknown threats early in the attack chain. SOAR uses the output of detection engines and investigations and recommends workflows or playbooks to build a response plan, saving time and effort. LW: Anything else?

Marketing 306
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Open XDR vs. SIEM

CyberSecurity Insiders

So, Open XDR is defined the same as Gartner’s XDR definition except that it ends with “all existing security components, delivered via an open architecture”. However, there are major architectural differences that allow Open XDR to deliver on many of the promises of SIEMs where SIEMs have fallen short. That’s because it is.

article thumbnail

Cybersecurity Predictions for 2023: My Reflections

Jane Frankland

Unsurprisingly, cyberattacks and data breaches show no signs of slowing as companies invest in technology to fuel growth, enhance customer experiences, support remote and hybrid workforces, and meet ESG goals. Here are my predictions for 2023. Types of attacks. Sustainability. More companies will be focused on sustainability.

article thumbnail

NEWS ANALYSIS Q&A: Striving for contextual understanding as digital transformation plays out

The Last Watchdog

Perhaps the biggest change lies in the way the rules are generated and maintained, where once a pool of highly skilled and experienced cybersecurity analysts iterated and codified actions as lovingly-maintained rules, today big data systems power machine learning systems to train complex classifiers and models.

article thumbnail

Exploring Cybersecurity Research Topics for Master’s Degree Studies

CyberSecurity Insiders

Privacy and Data Protection: Explore techniques and frameworks for protecting personal information and ensuring compliance with privacy regulations. Investigate topics such as privacy-preserving data mining, secure data sharing, and the impact of emerging technologies like artificial intelligence and big data analytics on individual privacy.

article thumbnail

The Evolution of SIEM: Where It’s Been and Where It is Going

CyberSecurity Insiders

Most of what a SIEM could do back then was get data in, aggregate it, and send alerts to security teams. They were also used for data retention and compliance. The most prevalent first- and second-generation SIEMs also came with very basic correlation engines, the best they knew how to do at that time.

Marketing 116