by John Verry | May 26, 2020 | InfoSec Strategies
Reading Time: 4 minutes
The word forensics usually makes us think of homicide… but it applies to computers, too. Understanding the need for computer forensics and occasions where it supports you during litigation is a must for anyone who wants to stay...
by Richard Barrus | May 25, 2020 | InfoSec Strategies
Reading Time: 2 minutes
There’s a lot of buzz about threat intelligence and threat hunting these days. But beyond the hype, what intelligence are organizations actually getting about cyber threats? How can you know true threat intelligence when you see it?...
by Richard Barrus | May 22, 2020 | InfoSec Strategies
Reading Time: 3 minutes
To share key considerations and best practices for SIEM adoption, a recent episode of The Virtual CISO Podcast from Pivot Point Security featured Danielle Russell, Director of Product Marketing Management at AT&T Cybersecurity, a...
by Richard Barrus | May 21, 2020 | InfoSec Strategies
Reading Time: 2 minutes
The goal of Security Information Event Management (SIEM) is to reduce risk to sensitive data behind the firewall and minimize breach impacts by shortening the threat detection window and data breach lifecycle—which currently averages...
by Richard Barrus | May 20, 2020 | InfoSec Strategies
Reading Time: 2 minutes
The coronavirus scenario is fueling an already hot trend in Security Information & Event Management (SIEM) tool deployment among SMBs. SIEM is a relatively broad and mature technology category with a plethora of options. If...