article thumbnail

SHARED INTEL Q&A: Everything the Cisco-Splunk merger tells us about the rise of SIEMs

The Last Watchdog

LW: Why are suppliers of legacy firewall, vulnerability management and EDR solutions also now integrating SIEM capabilities? We use machine learning models on open choice big data lakes to detect unknown threats early in the attack chain. Security teams needed greater visibility across their operating environment.

Marketing 306
article thumbnail

SHARING INTEL: Here’s why it has become so vital to prioritize the security-proofing of APIs

The Last Watchdog

Many organizations, for instance, continue to rely heavily on legacy firewalls and WAFs, which, of course, is precisely where Capital One went wrong. Salt Security is taking a big data and automation approach to this monumental challenge, Isbitski told me. Traditional approaches just aren’t working or can’t scale.

Big data 240
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: Exabeam retools SIEMs; applies credit card fraud detection tactics to network logs

The Last Watchdog

Launched in 2013 by Nir Polak, a former top exec at web application firewall vendor Imperva, Exabeam in just half a decade has raised an eye-popping $115 million in venture capital, grown to almost 350 employees and reaped over 100 percent revenue growth in each of the last three years. Here are a few takeaways: Very Big Data.

Big data 157
article thumbnail

NEW TECH: LogicHub introduces ‘virtualized’ security analysts to help elevate SOAR

The Last Watchdog

Here are my takeaways: Skills deficit Over the past 20 years, enterprises have shelled out small fortunes in order to stock their SOCs with the best firewalls, anti-malware suites, intrusion detection, data loss prevention and sandbox detonators money can buy. But that hasn’t been enough. Talk more soon.

Big data 159
article thumbnail

NEWS ANALYSIS Q&A: Striving for contextual understanding as digital transformation plays out

The Last Watchdog

Perhaps the biggest change lies in the way the rules are generated and maintained, where once a pool of highly skilled and experienced cybersecurity analysts iterated and codified actions as lovingly-maintained rules, today big data systems power machine learning systems to train complex classifiers and models.

article thumbnail

Everything about XDR is around Correlations, not Hype

CyberSecurity Insiders

It is not enough to say that you have a big data platform that you can dump things into and search; you need actionable detections that lead to meaningful correlations. Data Normalization – To get full visibility, the first thing you need to consider is the data itself.

Big data 110
article thumbnail

GUEST ESSAY – Notable events in hacking history that helped transform cybersecurity assessment

The Last Watchdog

It’s clear that when technology develops, people find creative ways to cause mass disruption, increasing the need for antivirus protection and firewalls. While she enjoys tackling topics across the technology space, she’s most passionate about educating readers on cybersecurity and Big Data.