Remove Cybersecurity Remove Threat Detection Remove Webinar
article thumbnail

20 Years of SIEM Webinar Q&A

Anton on Security

I recently did this fun SANS webinar titled “Anton Chuvakin Discusses “20 Years of SIEM?—?What’s What’s Next?”” (the seemingly self-centered title was suggested by CardinalOps who organized the webinar). As it is common for SANS webinars , we got a lot of great questions that I feel like re-answering here for posterity.

article thumbnail

News alert: Upcoming webinar highlights threat mitigation, fortifying ‘ASM’ with Criminal IP

The Last Watchdog

3, 2024, CyberNewswire — An exclusive live webinar will take place on October 4th at noon Eastern Time (ET), demonstrating how Criminal IP’s Attack Surface Management (ASM) can help organizations proactively detect and mitigate cyber threats. Users can register now for the free webinar at 12PM ET on October 10 ?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Make Threat Detection Better?

Anton on Security

I’ve lamented on this a few times, either touching on general difficulties with detection , its uncertainty or highlighting the fragile detections people write. Recent SANS Webinar on Detection By the way, this post ended up being more of “an incomplete thought” then a solid framework , but I hope you forgive me.

article thumbnail

[Webinar] When More Is Not Better: Solving Alert Overload

The Hacker News

The increasing volume and sophistication of cyberattacks have naturally led many companies to invest in additional cybersecurity technologies. We know that expanded threat detection capabilities are necessary for protection, but they have also led to several unintended consequences. An upcoming webinar by cybersecurity company

article thumbnail

Cybersecurity Snapshot: CSA Outlines Data Security Challenges and Best Practices, While ISACA Offers Tips To Retain IT Pros

Security Boulevard

Data risk-management strategies driven by regulation compliance, creating gaps for addressing emerging threats Recommendations include adopting proactive risk management, including vulnerability management, real-time monitoring and advanced threat detection.

article thumbnail

SOC Trends ISACA Webinar Q&A

Anton on Security

A few days ago we did a very well-attended webinar focused on the modern Security Operations Center (SOC) approach (see “Trend for the Modern SOC” for a replay link). Fully automated onboard log sources, threat detection rule creation, playbook creation, response, automated integration, and execute. Also see this paper.

Risk 100
article thumbnail

How to Make Threat Detection Better?

Security Boulevard

I’ve lamented on this a few times, either touching on general difficulties with detection , its uncertainty or highlighting the fragile detections people write. Here, I want to continue the conversation on detection quality. Recent SANS Webinar on Detection. What Are You NOT Detecting?”. More to come!