DPA-Powered Dashboards
The Challenge Knowing What to Trust With the proliferation of top-level domains, threat actors are using all sorts of DNS tricks to entice people to engage with malicious sites or to mask malicious traffic in the noise of normal traffic.…
Read More
August 23, 2016
SIEM’s Total Cost of Ownership
Posted by: Michael Suby
Michael Suby, as Stratecast’s Vice President of Research in Frost & Sullivan, engages with his seasoned team of analysts and business strategists in defining research direction and in delivering impactful customer interactions. Leveraging a 15-year analyst career, Mr. Suby maintains…
Read More
August 22, 2016
A Practical Approach to Effective Security Analytics
Posted by: Phil Villella
When discussing effective approaches to the problem of security analytics, I think it is first important to start with a clear definition of the goal of security analytics. The ultimate goal of security analytics is to deliver technology solutions that…
Read More
August 22, 2016
Started Near the Bottom. Now We’re Here!
LogRhythm made its first appearance in the Gartner Magic Quadrant for SIEM as a Visionary back in 2008. At the time, ArcSight was the Goliath in the market in terms of market share, customer penetration, and momentum. David (aka LogRhythm)…
Read More
August 11, 2016
Who is Listening in on Your Network?
The Threat of Data Exfiltration with Packet Capture Software With the sheer volume of network traffic and the variety of applications that travel across a typical network these days, it is not surprising how easy it is to gather high-value…
Read More
July 28, 2016
Detecting Beaconing Malware with Network Monitor
The Difficulty in Detecting Beaconing Malware When it comes to threat detection, you’re taking great measures to protect your organization. Yet threats, such as malware, keep getting in despite the network monitoring tools and enterprise threat detection solutions you have…
Read More
July 26, 2016