A selection of this week’s more interesting vulnerability disclosures and cyber security news. There has been some amazing breach notifications this week, none of which I will comment on as there’s plenty of articles already.
As a security researcher and software engineer, I always find it interesting to participate in an incident response.
A lot of firms collect massive amounts of data every day (up to billions of events) to improve their security efforts, enhance their business intelligence, and refine their marketing strategies.
With the new year, comes new possibilities—and a new blog series!
A selection of this week’s more interesting vulnerability disclosures and cyber security news. Another week in to 2019 and it’s just not getting better is it? Some more pretty big breaches and the worst; companies that should know better apparently missing the mark.
Properly utilizing and thoroughly analyzing your event logs is one of the cornerstones of IT security. Today, cybersecurity is more important than ever and is an entire growing industry all in itself, with the global cybersecurity market estimated to reach almost $250 billion value by 2023.
Gartner just released their 2018 Magic Quadrant for Security Information and Event Management (SIEM), which we’re once again excited to be part of!
This article covers the main techniques cybercriminals use at the initial stage of attacks against enterprise networks. There are several dangerous phases of cyberattacks targeting the corporate segment. The first one encountered by businesses boils down to getting initial access into their systems.