Remove Blog Remove Data collection Remove Threat Detection
article thumbnail

How to Measure Threat Detection Quality for an Organization?

Anton on Security

Sometimes I write blog posts with answers. In other cases, I write blog posts with questions. This particular blog post covers a topic where I feel I am in the “discovering questions” phase. Here I’m talking about the quality of the entire detection capability of an organization. In other words, don’t expect answers?—?but

article thumbnail

GUEST ESSAY: Cisco-Splunk merger will boost Snowflake – here’s how security teams can benefit.

The Last Watchdog

Splunk’s inability to migrate to a modern cloud-native architecture makes it difficult to take advantage of these cost-saving benefits or implement advanced data science use cases critical for threat detection. The Cisco acquisition shall exacerbate these challenges and speed up the adoption of security data lakes.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Measure Threat Detection Quality for an Organization?

Security Boulevard

Sometimes I write blog posts with answers. In other cases, I write blog posts with questions. This particular blog post covers a topic where I feel I am in the “discovering questions” phase. So, in recent weeks, I had a few simultaneous conversations with various people that focused on the quality of threat detection.

article thumbnail

SOC Technology Failures?—?Do They Matter?

Anton on Security

Hence this blog was born. Data collection failures still plague many SOCs. Now, again, one can also blame this on people and processes (especially, those people in IT who just didn’t give us the data). BTW, if somebody wakes me up at 3:00 a.m. I would name the loss of executive commitment. Yes, DIY SOC tools fail as well.

article thumbnail

Decoupled SIEM: Brilliant or Stupid?

Anton on Security

The second part of the answer would be to outline the type of an organization that would very much prefer the decoupled SIEM where the best collection and modern storage somehow harmoniously work with the best threat detection and response content. (B)

article thumbnail

Report Finds Over 50% of Security Practitioners Are Unhappy With Current SIEM Vendor

CyberSecurity Insiders

Security industry blogs, magazines, and websites frequently report that many security teams are frustrated by the limitations of their SIEM tool. Analysts find dealing with data collected from numerous hosts within an enterprise to be a daunting task.

article thumbnail

6 Business functions that will benefit from cybersecurity automation

CyberSecurity Insiders

This blog was written by an independent guest blogger. Cybersecurity automation gives organizations the ability to perform threat detection and incident response at scale. Many security professionals spend hours each day manually administering tools to protect enterprise data. Data privacy.