Microsoft reveals pricing for its cloud-based Azure Sentinel SIEM service
Microsoft has announced general availability of its Azure Sentinel cloud security analytics platform.
Microsoft has announced general availability of its Azure Sentinel cloud security analytics platform.
VirusTotal, acquired by Google in 2012, is now again under Google as part of Chronicle's move to Google Cloud.
Alphabet's Chronicle launches Backstory, a cloud-based threat hunting service that promises cheaper storage and longer retention of threat data.
Enterprise customers can now tap Microsoft experts in a cyber security emergency.
Good information-security personnel have become harder and harder to find – and that is making it harder to mount an effective defence against ballooning volumes of security alerts.
David Braue | 08 Sep | Read more
Cybercriminals are collaborating to refine their attacks and businesses must do the same by leveraging a growing body of open-source security tools, a security expert has advised as open-source machine learning puts the technology into the mainstream.
David Braue | 22 Dec | Read more
One of the most contentious issues facing organisations today is the need for diversity. Diversity in gender, ethnicity, educational background and attitude can be an incredibly valuable asset to organisations that are open to it.
Anthony Caruana | 28 Oct | Read more
With over two decades of experience working in the world information security risk and data protect, Tenable Network Security Co-Founder and Chairman of the Board Ron Gula has seen it all.
Anthony Caruana | 27 Oct | Read more
“When you look at international organised crime, it’s worth about $1.7 trillion a year. It’s made up six or seven key components. Those are things like counterfeiting, arms trade, drugs, people trafficking and smuggling, the sex trade,” he says.
Anthony Caruana | 31 Aug | Read more
Despite an initial rush to adopt security and information event management (SIEM) tools, complex implementations and a lack of skilled staff left many companies struggling to use SIEM effectively. That's all set to change, however, as a new generation of SIEM tools bolsters top-down monitoring of network and cloud-application activity with applied analytics techniques that help spot security incidents as soon as they're happening.
David Braue | 16 Jun | Read more
It is no longer a matter of specific industries: More and more businesses are facing the challenges of digitization.
Matthias Reinwarth | 02 Jun | Read more
Think you've got identity under control? Think again, warns one expert in the area who has seen far too many organisations stumbling on with legacy identity and access management (IAM) environments that are no longer up to the challenges of modern mobile and cloud-based information infrastructures.
David Braue | 02 Jun | Read more
In the last few years, security practitioners have become quite vocal over their belief that the perimeter is dead. You need not look very far to see the evidence of this: Breaches hit the headlines on a weekly basis, and more and more vendors are switching their tag lines from impervious defence towards faster detection and response.
Michael Lee | 11 Apr | Read more
Ask any security expert and they’ll tell you almost every successful hack starts at an end-point. And while much of the focus is given to notebooks, desktops, tablets and smartphones many tend to neglect printers as a potential attack vector.
Anthony Caruana | 11 Apr | Read more
This year marked my fourth RSA Conference – I’ve attended three in San Francisco and one in Singapore – and each year there are some stand-out issues and themes that dominate discussion.
Anthony Caruana | 18 Mar | Read more