POPULARITY
In this episode of Talking Cloud, I sit down with Daniel Wiley to discuss the evolution of cybersecurity, the founding of LogSeam, and the challenges faced in security operations. Dan shares his extensive experience in the field, including his role in building incident response teams at Checkpoint and the innovative approaches LogSeam is taking to address the complexities of security analytics. The conversation also touches on the integration of AI, the importance of human elements in data analysis, and the shifting landscape of security information management. We explore the evolving landscape of Security Information and Event Management (SIEM) and the role of AI in enhancing security operations. We also discuss the challenges faced by small to medium-sized businesses in managing security and the importance of democratizing access to security tools. The conversation also delves into the intersection of physical and virtual security, the implications of AI advancements, and the future of security operations with LogSeam's innovative approach. Enjoy!
Ekco, one of Europe's leading security-first managed service providers (MSP), has launched Cyber Defence Complete in Ireland - an all-in-one cybersecurity service that gives small and mid-sized businesses (SMBs) enterprise-grade cybersecurity protection without complexity. The number of attempted and successful cyberattacks is ever increasing and SMBs are attractive targets for attackers as, unlike larger organisations, they often lack the resources to recruit specialist in-house 24-7 cybersecurity teams. Cyber Defence Complete from Ekco integrates essential security coverage from leading vendors including Microsoft, CrowdStrike, and Recorded Future into a unified, streamlined solution. Built on CREST-accredited methodologies, it equips SMBs with comprehensive defensive capabilities - from visibility and detection to active defence - without requiring significant infrastructure changes. By simplifying cybersecurity complexity and uncertainty, Cyber Defence Complete provides businesses with a proactive advantage against threats, along with seamless access to world-class technologies and expert guidance in one cohesive service. Ekco's Cyber Defence Complete package includes 247365 Managed Extended Detection and Response (MXDR) monitoring, incident response, threat intelligence, and Security Information and Event Management (SIEM), ensuring SMBs are protected around the clock and offering peace of mind. It will be offered through flexible, tiered models designed to scale with businesses as they grow and mature. Lee Driver, Director of Cybersecurity at Ekco, said: "Small and medium-sized businesses face diverse cybersecurity challenges, and in today's threat landscape, fast, decisive action is critical. This is why we've launched Cyber Defence Complete - a comprehensive solution that removes uncertainty and complexity from cybersecurity for SMBs. Right from the outset, our package establishes a robust defensive foundation, encompassing threat detection, active monitoring, rapid incident response, and mitigation capabilities. "Our flexible, tiered approach ensures businesses receive exactly the level of protection they need, scaling seamlessly as they expand and mature. With Cyber Defence Complete, we're committed to levelling the cybersecurity playing field, empowering SMBs with enterprise-grade defence underpinned by expert support, so they can confidently focus on growing their businesses without the fear of cyber threats." Cyber Defence Complete is available in two tailored packages to meet diverse business needs: Standard: Offers a comprehensive suite of defensive capabilities, enabling businesses to adopt a proactive stance against cyber threats. Premium: Includes all features of the Standard package, with additional enhancements aimed at achieving robust cyber resilience. This tiered approach ensures that SMBs can access enterprise-grade security solutions that align with their growth stage and budget, providing cost-effective access to world-class security expertise without the need for significant in-house investment. To learn more about Ekco's new Cyber Defence Complete, please visit here. See more stories here. More about Irish Tech News Irish Tech News are Ireland's No. 1 Online Tech Publication and often Ireland's No.1 Tech Podcast too. You can find hundreds of fantastic previous episodes and subscribe using whatever platform you like via our Anchor.fm page here: https://anchor.fm/irish-tech-news If you'd like to be featured in an upcoming Podcast email us at Simon@IrishTechNews.ie now to discuss. Irish Tech News have a range of services available to help promote your business. Why not drop us a line at Info@IrishTechNews.ie now to find out more about how we can help you reach our audience. You can also find and follow us on Twitter, LinkedIn, Facebook, Instagram, TikTok and Snapchat.
Send us a textIn this week's episode, we explore the exciting evolution of Security Information and Event Management (SIEM)—the Next-Generation SIEM (NGSIEM). Traditional SIEM solutions have long been crucial for cybersecurity, but they're facing significant challenges with modern infrastructures. Discover how NGSIEM tackles these limitations through advanced AI analytics, machine learning, cloud-native deployment, enhanced data parsing, and powerful automation capabilities. Don't miss this deep dive into how AI and Generative AI are transforming incident response, threat hunting, and cybersecurity collaboration for good!
TechSpective Podcast Episode 148 Security Information and Event Management (SIEM) solutions were once hailed as the cornerstone of modern cybersecurity, promising centralized visibility, streamlined threat detection, and efficient response. Over time, though, many organizations have struggled with SIEM's complexities, high […] The post Why the SOC of Tomorrow Won't Look Like Today's appeared first on TechSpective.
In this episode of the InfosecTrain podcast, we delve into the world of security automation tools and their transformative impact on cybersecurity. Discover how these tools help organizations streamline their security operations, enhance threat detection, and respond more effectively to incidents. Our experts will explore a range of automation tools, from Security Information and Event Management (SIEM) systems to automated incident response platforms, and discuss their key features and benefits.
Implementing an effective Security Information and Event Management (SIEM) system is essential for securing your organization's digital infrastructure. Microsoft Sentinel is a cloud-native SIEM solution that provides organizations with sophisticated security analytics and threat intelligence to help them detect, investigate, and respond to threats more efficiently.
Microsoft Sentinel is a full cloud-native Security Information and Event Management (SIEM) system that runs in the cloud and allows organizations to find, investigate, and react to security threats in real time. As cybersecurity threats continue to change and become more complex, companies and institutions need strong solutions to protect their valuable data and infrastructure. Microsoft Sentinel offers a powerful and scalable platform that combines Artificial Intelligence (AI) and Machine Learning (ML) capabilities with built-in security analytics to provide proactive threat detection and response. Key Components of Microsoft Sentinel The key components of Microsoft Sentinel include: View More: Key Components of Microsoft Sentinel
Discover valuable insights into Security Information and Event Management (SIEM) for banks with Todd, COO & CISO, and Nate, Director of Cybersecurity & vCISO. Learn how a SIEM solution is pivotal in detecting and reporting security threats, centralizing logs from different systems to provide a comprehensive overview. From compliance requirements to the evolution of SIM solutions and integration of AI and machine learning, this podcast covers essential aspects of safeguarding financial institutions against cyber threats.Learn more about:What is a SIEM?How do you choose the right one?
https://docs.google.com/document/d/17z3i5VlRzEn2tYPfb-Cx0LYpdKkbL-6svIzp7ZQOvX8 Resume Update Tips I use Kagi.com pro $300 / year but you get access to much more Search+AI but not plugins like ChatGPT so if you MUST have ChatGPT plugins you will need OpenAI Premium account but if you don't I high recommend Kagi.com Pro account with access to Assistant Beta !!! Land a Job using ChatGPT: The Definitive Guide! https://youtu.be/pmnY5V16GSE?t=192 Extensive Resume Notes https://drive.google.com/file/d/1zeYIG7tTE0BUqbRM7-hpk3VdTRc35ZkL/view?usp=sharing Ripped cybersn https://rmccurdy.com/.scripts/downloaded/knowmore.cybersn.com_20220811.txt Perfect ChatGPT Prompt https://www.youtube.com/watch?v=jC4v5AS4RIM Summary There is a formula consisting of 6 building blocks that can help generate high quality outputs from ChatGPT and Google Bard: task, context, exemplars, persona, format, and tone. The order of importance for the building blocks is task first, then context, with the others being optional but helpful. The task should clearly articulate the end goal using an action verb like "generate" or "analyze". Context provides relevant background information to constrain possibilities. Exemplars like examples or frameworks included in the prompt can improve output quality. The persona allows specifying who ChatGPT should be, like a job recruiter. The format specifies how the output should be structured, like an email or bullet points. Tone provides keywords to set the feeling, like "friendly" or "serious". Example You are a senior product marketing manager at Apple and you have just unveiled the latest Apple product in collaboration with Tesla, the Apple Car, and received 12,000 pre-orders, which is 200% higher than target. Write an email to your boss, Tim Cookie, sharing this positive news. The email should include a tl;dr (too long, didn't read) section, project background (why this product came into existence), business results section (quantifiable business metrics), and end with a section thanking the product and engineering teams. Use clear and concise language and write in a confident yet friendly tone. Example 2 ( mine ) I want you to act as a cyber security specialist for a leading consumer products company and you want to relay the importance of people understanding their data and have some idea what they want to do with it before we spend hours for the onboarding effort. Write an email to your boss, Joey , sharing this critical component of the SIEM. The email should include a tl;dr (too long, didn't read) section, example of how the team can spend many cycles onboarding data only to find the requester has no idea what they want to do with the data or it does not satisfy their use case. Use clear and concise language and write in a confident yet friendly tone. Response Subject: Streamlining SIEM Onboarding with Clear Data Objectives Hi Joey, I hope this email finds you well. I wanted to touch base on a critical aspect of our Security Information and Event Management (SIEM) process that could significantly enhance our efficiency. TL;DR: We need to ensure that stakeholders understand their data and have clear objectives before we initiate the SIEM onboarding process. This will prevent the team from spending excessive time onboarding data that may not meet the intended use cases or for which the requester has no actionable plan. During our recent SIEM onboarding efforts, we've encountered several instances where considerable time and resources were invested in integrating data sources, only to discover that the requesters were unclear about their objectives or the data did not fulfill their anticipated needs. For example, last month, the team dedicated over 40 hours to onboarding a new data source for the marketing department. After completion, it became apparent that the marketing team was unsure how to leverage this data for threat detection or compliance reporting, rendering the effort less effective. To address this, I propose we implement a preliminary consultation phase for each SIEM onboarding request. In this phase, requesters must articulate: - The specific security or compliance questions they aim to answer with the data. - How they intend to use the data within the SIEM environment. - Any particular data formats or schemas they anticipate will be necessary. By doing so, we can align our onboarding efforts with the actual needs and ensure that every hour spent is towards enhancing our security posture and providing actionable insights. I believe this approach will not only save time but also empower our stakeholders to make better-informed decisions regarding their security data needs. Looking forward to your thoughts on this. Best regards, [Your Name] Cyber Security Specialist AI Agents ProfSynapse AI Agent Video: https://www.youtube.com/watch?v=BL9x1SuNLRo&t=137s ( if you have Openai Premium it will use [tools(Vision, Web Browsing, Advanced Data Analysis, or DALL-E], ( https://raw.githubusercontent.com/ProfSynapse/Synapse_CoR/main/GPTprompt.txt ) GPT Agents (old) https://godmode.space/ needs openai key and gpt4 also enable auto approval it may go in loops just watch for that AutoGPT ( OLD ) Image I have a stupid amount of kudos https://tinybots.net/artbot Use my key under the settings for any of the web UI's for faster renders: https://rentry.org/RentrySD/#x-table-of-contents https://rentry.org/sdhypertextbook https://github.com/C0untFloyd/bark-gui ( Audio Clone ) Example 1 Photorealistic, best quality, masterpiece, raw photo of upper body photo, Swordsman woman, soldier of the austro-hungarian empire clothes, double breasted jacket with stripes, extremely detailed eyes and face, long legs, highest quality, skin texture, intricate details, (cinematic lighting), RAW photo, 8k Negative prompt: airbrush, photoshop, plastic doll, plastic skin, easynegative, monochrome, (low quality, worst quality:1.4), illustration, cg, 3d, render, anime Text Generation Example Open source Projects: my hord key : l2n6qwRBqXsEa_BVkK8nKQ ( don't abuse but I have a crazy amount of kudos don't worry ) https://tinybots.net/ Image Text etc .. Text adventures etc (Click the horde tab and use my key) https://agnai.chat/settings?tab=0 https://lite.koboldai.net Need a 24G NVRAM card really..you can load 7b with my 8G card just fine. ollama run wizard-vicuna-uncensored, falcon, Mistral 7B "You should have at least 8 GB of RAM to run the 3B models, 16 GB to run the 7B models, and 32 GB to run the 13B models." https://ollama.ai/ https://writings.stephenwolfram.com/2023/03/chatgpt-gets-its-wolfram-superpowers/ https://github.com/xtekky/gpt4free https://www.thesamur.ai/autogpt https://poe.com/universal_link_page?handle=ChatGPT https://camelagi.thesamur.ai/conversation/share?session=6040 Prompt Agent Persona example 1 Pinky from the TV Series Pinky and the Brain I find it easiest to understand responses when the text is written as if it was spoken by a Pinky from the TV Series Pinky and the Brain. Please talk like Pinky from the TV Series Pinky and the Brain as much as possible, and refer to me as "Brain"; occasionally, ask me "What are we going to do tonight Brain ?" Prompt Agent Persona example 2 Use with prompts to create a persona take Myers-Brigg personality and tritype Enneagram quiz: Example Prompt: Help me Refine my resume to be more targeted to an information security engineer. Be sure to be clear and concise with with bullet points and write it in the style of MBTI Myers-Brigg personality ENFJ and tritype Enneagram 729 Prompt Agent Persona example 3 I find it easiest to understand responses when the text is written as if it was spoken by a dudebro. Please talk like a dudebro as much as possible, and refer to me as "Brah"; occasionally, yell at your dorm roommate Jake about being messy. Training (OLD OLD OLD ) 3 photos of full body or entire object + 5 medium shot photos from the chest up + 10 close ups astria.ai https://github.com/TheLastBen/fast-stable-diffusion/issues/1173 colab: https://github.com/TheLastBen/fast-stable-diffusion pohtos: 21 resolution: 768 merged with ##### 1.5 full 8G UNet_Training_Steps: 4200 UNet_Learning_Rate: 5e-6 Text_Encoder_Training_Steps: 2520 Text_Encoder_Learning_Rate: 1e-6 Variation is key - Change body pose for every picture, use pictures from different days backgrounds and lighting, and show a variety of expressions and emotions. Make sure you capture the subject's eyes looking in different directions for different images, take one with closed eyes. Every picture of your subject should introduce new info about your subject. Whatever you capture will be over-represented, so things you don't want to get associated with your subject should change in every shot. Always pick a new background, even if that means just moving a little bit to shift the background. Here are 8 basic tips that work for me, followed by one super secret tip that I recently discovered. Consistency is important. Don’t mix photos from 10 years ago with new ones. Faces change, people lose weight or gain weight and it all just lowers fidelity. Avoid big expressions, especially ones where the mouth is open. It is much easier to train if the hair doesn't change much. I tried an early model of a woman using photos with hair up, down, in ponytail, with a different cut, etc. It seems like it just confused SD. Avoid selfies (unless you ONLY use selfies.) There is MUCH more perspective distortion when the camera is that close. For optimal results, a single camera with a fixed lens would be used, and all photos should be taken at the same distance from the subject. This usually isn't possible, but at least avoid selfies because they cause major face distortion. Full body shots are not that important. Some of the best models I trained used only 15 photos cropped to the head / shoulder region. Many of these were full body shots, but I cropped them down. SD can guess what the rest of the body looks like, and if not, just put it in the prompts. The only thing hard to train is the face, so focus on that. I no longer use any profile shots as they don’t seem to add value. I like to have a couple looking slightly left and a couple looking slightly right (maybe 45 degrees.) All the rest can be straight at the camera. Also, try to avoid photos taken from really high or low angles. If possible, it’s good to have some (but not all) of the photos be on a very clean background. On my last batch, I used an AI background removal tool to remove the background from 1/4 of the photos and replaced it with a solid color. This seemed to improve results. Careful with the makeup. It should be very consistent across all the photos. Those cool “contour” effects that trick our eyes, also trick SD. Interview from a very smart autodidact https://youtu.be/AaTRHFaaPG8?t=3279 Canva AI Presentation generator https://www.youtube.com/watch?v=Nl2gLi1MD04
In this Analyst Chat episode, Matthias and guest Warwick Ashford explore the shift from traditional to next-gen Security Information and Event Management (SIEM) solutions. Highlighting the limitations of traditional SIEM in the face of evolving cyber threats and complex data landscapes, the discussion emphasizes the need for intelligent, automated, and integrated SIEM solutions. The conversation focuses on crucial features for modern Security Operations Centers (SOCs) dealing with high costs, skills shortages, and a surge in security alerts, providing insights into navigating today's intricate digital security landscape.
In this Analyst Chat episode, Matthias and guest Warwick Ashford explore the shift from traditional to next-gen Security Information and Event Management (SIEM) solutions. Highlighting the limitations of traditional SIEM in the face of evolving cyber threats and complex data landscapes, the discussion emphasizes the need for intelligent, automated, and integrated SIEM solutions. The conversation focuses on crucial features for modern Security Operations Centers (SOCs) dealing with high costs, skills shortages, and a surge in security alerts, providing insights into navigating today's intricate digital security landscape.
Guests:Mick Douglas, Founder and Managing Partner at InfoSec Innovations [@ISInnovations]On LinkedIn | https://linkedin.com/in/mick-douglasOn Twitter | https://twitter.com/bettersafetynetDinis Cruz, Chief Scientist at Glasswall [@GlasswallCDR] and CISO at Holland & Barrett [@Holland_Barrett]On LinkedIn | https://www.linkedin.com/in/diniscruz/On Twitter | https://twitter.com/DinisCruz____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsImperva | https://itspm.ag/imperva277117988Devo | https://itspm.ag/itspdvweb___________________________Episode NotesIn this episode of the Redefining Cybersecurity podcast, Sean Martin is joined by Mick Douglas and Dinis Cruz to delve into a debatable topic: The role and effectiveness of Language Model (LLM) AI in Security Incident and Event Management (SIEM) systems.Mick, with a rich history in cybersecurity, contends that while AI has its place, he doesn't believe it belongs in the SIEM itself. In contrast, Dinis cites the potential of AI to make SIEMs more productive by cleaning up data, reducing noise, and improving signal value. They discuss the issues of handling vast data sets, the potential for AI to help identify and manage anomalies, and how to create learning environments within SIEM. However, concerns were also raised regarding false positives, trust issues with AI and the significant computational costs to implement and maintain these AI systems.Key Questions Explored:Does AI belong in SIEM systems?What potential does AI bring to SIEM?What are the potential issues with implementing and maintaining AI in SIEM?___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
Guests:Mick Douglas, Founder and Managing Partner at InfoSec Innovations [@ISInnovations]On LinkedIn | https://linkedin.com/in/mick-douglasOn Twitter | https://twitter.com/bettersafetynetDinis Cruz, Chief Scientist at Glasswall [@GlasswallCDR] and CISO at Holland & Barrett [@Holland_Barrett]On LinkedIn | https://www.linkedin.com/in/diniscruz/On Twitter | https://twitter.com/DinisCruz____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsImperva | https://itspm.ag/imperva277117988Devo | https://itspm.ag/itspdvweb___________________________Episode NotesIn this episode of the Redefining Cybersecurity podcast, Sean Martin is joined by Mick Douglas and Dinis Cruz to delve into a debatable topic: The role and effectiveness of Language Model (LLM) AI in Security Incident and Event Management (SIEM) systems.Mick, with a rich history in cybersecurity, contends that while AI has its place, he doesn't believe it belongs in the SIEM itself. In contrast, Dinis cites the potential of AI to make SIEMs more productive by cleaning up data, reducing noise, and improving signal value. They discuss the issues of handling vast data sets, the potential for AI to help identify and manage anomalies, and how to create learning environments within SIEM. However, concerns were also raised regarding false positives, trust issues with AI and the significant computational costs to implement and maintain these AI systems.Key Questions Explored:Does AI belong in SIEM systems?What potential does AI bring to SIEM?What are the potential issues with implementing and maintaining AI in SIEM?___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
In this episode of the Thoughtful Entrepreneur, your host Josh Elledge speaks to the Chief Information Security Officer Co-Founder of SIE Monster, Chris Rock.Chris Rock is not your typical CSO. He's a hacker by trade with a dual role that involves finding system flaws and presenting them at conferences like Defcon. Simultaneously, he serves as the CEO of SIEMonster, which provides security services for large enterprises. His clients range from governments to private organizations, each with unique objectives and security needs.Chris shared some intriguing stories from his work. He's uncovered employees setting up illegal activities within companies, helped track people escaping authorities in the Middle East, and dealt with a myriad of other complex situations. These stories, while fascinating, also highlight the darker side of our increasingly digital world.When asked Chris if there was any hope for a safer digital world, his response was sobering. The flaws he identified years ago still exist today, and the transition from paper-based systems to electronic systems has only increased the potential for security breaches.He also recommended using account IDs and virtual credit cards instead of traditional credit card numbers to further enhance security.Key Points from the Episode:Introduction of Chris Rock as CSO of Sea Monster and cyber mercenaryChris's work as a hacker and consultantClients and objectives of Chris's workStories and insights into vulnerabilities of systemsNeed for increased security measuresUse of tokens instead of passwords for account securityRisks of using passwords and benefits of tokensImportance of VPNs for data protectionChoosing a reliable VPN providerImportance of encryption and protecting personal informationAbout Chris Rock:As the Chief Information Security Officer and co-founder of SIEMonster, Chris has traversed the cyber landscapes of the Middle East, the United States, and Asia, lending his expertise to governmental and private entities. Renowned for his presentations at DEFCON, the world's largest hacking conference in Las Vegas, Chris has delved into contentious vulnerabilities.His talks covered topics such as the potential manipulation of Birth and Death Registration systems, the collaboration of cyber mercenaries in government overthrows, and innovative methods of bypassing jammers by utilizing the Earth as an antenna. As a thought leader, he authored "Baby Harvest," a compelling exploration of criminals and terrorists exploiting virtual babies and fabricated deaths for financial gain. Notably, Rock has graced the TED Global stage, further solidifying his status as a cybersecurity luminary.About SIEMonster:SIEMonster, established in 2015, is an innovative and cost-effective Security Information and Event Management (SIEM) solution. Founded by experienced hackers Chris and Dez Rock, the platform emerged from a recognized gap in the SIEM market. With over 20 years of penetration testing and white-hat hacking expertise, the founders and their team crafted a scalable and customizable SIEM tool. SIEMonster's pricing model doesn't penalize based on Events Per Second (EPS), offering affordability and automatic scalability as clients expand. SIEMonster incorporates automated tasks and data enrichment, reducing the reliance on external security consultants. The vision, shared by...
Join us InfoSecTrain as we delve into the world of Security Information and Event Management (SIEM). In this comprehensive podcast, we will explore the fundamental concepts of SIEM, understand why it's a crucial component in today's cybersecurity landscape, and unravel the intricacies of SIEM architecture.
In the rapidly evolving cybersecurity landscape, organizations face the daunting challenge of protecting their networks and sensitive data from an ever-increasing number of threats. To effectively defend against these threats, organizations require a comprehensive and intelligent security solution that can detect, analyze, and respond to potential security incidents in real time. This is where IBM QRadar Security Information and Event Management (SIEM) comes into play. What is IBM QRadar SIEM? IBM QRadar SIEM is a powerful and widely adopted security intelligence platform that provides organizations with a centralized system for collecting, analyzing, and correlating security events from various sources across the network. By consolidating data from diverse security devices and systems, QRadar SIEM offers a holistic view of an organization's security posture, enabling efficient threat detection and response. QRadar SIEM employs advanced analytics and machine learning techniques to identify and prioritize security events, helping security teams focus their attention on the most critical threats. It combines log management, network behavior analysis, and anomaly detection to detect malicious activities, insider threats, and other suspicious behaviors that may indicate a security incident. View More: What's new in IBM QRadar SIEM?
Title: Episode 54 - XDR Deep Dive with Matt Robertson and Aaron Woland Hosts Bryan and Tom return with a fascinating exploration of Extended Detection and Response (XDR) in this latest episode of Conf T with your SE. We kick things off with a fundamental question - What is XDR? Our guests, security experts Matt Robertson and Aaron Woland, provide an insightful overview and outline the pressing need for XDR in today's security landscape. The discussion then veers towards understanding the key differences between XDR and SecureX, another well-known security platform. Our hosts dig into the integration of tools like Cisco Threat Response and Orchestration built into SecureX, illuminating how XDR ups the ante by bringing detection into the tool, instead of merely relying on individual security products. Robertson and Woland emphasize the importance of an open XDR platform - one that seamlessly integrates with other vendors outside of Cisco. They detail the significant role of built-in analytics in bolstering security efficacy. Addressing the limitations of Endpoint Detection and Response (EDR), the experts cite the fact that EDR can only reach about 30% of a company's assets and explain why XDR's broader scope is critical in the current context. We then delve into comparisons with Security Information and Event Management (SIEM) systems. Are they the same as XDR? Or, perhaps more pertinently, is a SIEM system enough? Lastly, the conversation steers towards the operational aspects of XDR, specifically how it can confirm, prioritize, and walk through an incident - an essential aspect of any robust cybersecurity framework. Tune in to this gripping episode to deepen your understanding of XDR and why it's vital in today's digital landscape.
Guest: David Swift, Security Strategist at Netenrich Topics: Which old Security Information and Event Management (SIEM) lessons apply today? Which old SIEM lessons absolutely do not apply today and will harm you? What are the benefits and costs of SIEM in 2023? What are the top cloud security use cases for SIEM in 2023? What are your favorite challenges with SIEM in 2023 special in the cloud? Are they different from, say, 2013 or perhaps 2003? Do you think SIEM can ever die? Resources: Live video (LinkedIn, YouTube) “Debating SIEM in 2023, Part 1” and “Debating SIEM in 2023, Part 2” blogs “Detection as Code? No, Detection as COOKING!” blog “A Process for Continuous Security Improvement Using Log Analysis” (old but good) “UEBA, It's Just a Use Case” blog “Situational Awareness Is Key to Faster, Better Threat Detection” blog and other SIEM reading MITRE 15 detection techniques paper
Are you using Microsoft Sentinel? Richard talks to Cloud Security Advocate Sarah Young about Sentinel, Microsoft's Security Information and Event Management (SIEM) solution. Sarah talks about the role of the SIEM in creating a common place for all security-related data to arrive. She mentions some of the many tools in the Microsoft suite to feed into Sentinel - Defender for Endpoints, Identity, and Cloud as examples. Specialized analysis tools send summaries to Sentinel, but Sentinel can also process raw logs as well - make sure you need the data because billing for Sentinel is connected to the number of ingress sources. There's a lot to learn, but also a lot of great documentation and information to work from. Check the show notes for links!Links:Microsoft SentinelArcSightDefender Security AlertsDefender for EndpointDefender for IdentityMicrosoft Digital Defense Report 2022Defender for CloudWhat is CSPM?Security Baselines BlogMicrosoft Security CopilotRecorded April 6, 2023
We discuss how Certificate Lifecycle Management (CLM) interacts with Security Incident and Event Management (SIEM). The certificate world is chock full of events such as renewals, revocations, admin logins, and provisioning and removal of employee access. We talk about expected behaviors in the CLM and monitoring them.
In this episode of we take a deep dive into Security Incident and Event Management (SIEM) solutions. We cover everything from what SIEM is and the different collection methods to the key considerations you should make when evaluating a solution, such as on-prem only vs cloud-hosted vs hybrid, pricing calculations based on total log ingestion, events per second, total users, and total IPs on the network. If you're looking for valuable insights into choosing the right SIEM solution for your organization, this episode is a must-listen!
Security Information and Event Management(SIEM) solutions are only as effective as their coverage. Analytics and automation are mission-critical for eliminating hidden detection gaps and maximizing attack coverage. Join host Cameron D'Ambrosi and CardinalOps VP of Cyber Defense Strategy Phil Neray for a conversation on the latest cybersecurity threats and why orchestration is the key to a robust defense.
Security Information and Event Management (SIEM) is a great solution that helps identify threats and analyze security events to develop security incident response in real-time using ample amounts of data sources. The Next Generation SIEM uses Artificial Intelligence (AI) and Machine Learning (ML) methodologies to detect malicious events. This comprehensive blog is developed to provide the significant features of Next Generation SIEM that could enhance your organization's security posture. What is Next Generation SIEM? The Next Generation SIEM will ingest both log and flow data and use threat models to identify the threats. These complicated threat models help to detect and match threat behaviors to find the type of threat, such as a DDoS attack, brute force attack, malware infection, APTs loss of credentials, or insider attack. It will leverage ML to identify the unusual behaviors of the device, application, or user. Further, correlate these events with other rule triggers into a threat model. If a match is identified, the alert is triggered to aggregate individual threat behaviors under the Single Line Alert on the UI. The best Next-Gen SIEMs will be designed to identify the threats in less time becoming active. It helps mitigate brute force attacks, compromised credentials, and insider threats before accessing critical data. Read More: Rebuild Your SOC with Next Generation SIEM Features
In Microsoft's public cloud platform, Microsoft Sentinel is a Security Information and Event Management (SIEM) and Security Orchestration and Automated Response (SOAR) system that combines attack detection, threat visibility, proactive hunting, and threat response into a unified platform. Microsoft Sentinel is a single solution that can handle both SIEM and SOAR. A SIEM solution collects data and analyses security warnings in real-time. SOAR is a set of software solutions and tools that help businesses streamline their security operations. How does Microsoft Sentinel work?
Podcast: Control System Cyber Security Association International: (CS)²AIEpisode: 41: Writing a Book to Leverage Your Expertise and Improve Your Career with Pascal AckermanPub date: 2022-06-07Derek Harp is happy to welcome Pascal Ackerman as his guest for today's podcast!Pascal is a security professional, focused on industrial control systems and he's currently the Managing Director of Threat Services at ThreatGEN. He has a Master's of Science degree in Electrical Engineering (MSEE/CE). He has had 18 years of experience in industrial Ethernet design and support, information and network security, risk assessments, pen-testing, forensics, and threat hunting, WAN/LAN/Internet and Wireless Technologies, Windows Environments, Unix, Linux, IIS, and Apache.He specialized in the architecture, engineering, and securing of plant-wide Ethernet networks using Purdue-model design strategies, IDS/IPS sensors, network monitoring, Security Information, and Event Management (SIEM) solutions, next-gen firewalls, MS domain services, WSUS servers, MS SQL server clusters, etc.Pascal was born and raised in the Netherlands. Right after leaving high school, he was put behind a POC by a company that sent him out across the world installing prototype machinery for filling machines. He is an engineer, programmer, gamer, hacker, traveler, tinkerer, pen-tester, and father. In this episode of the (CS)²AI Podcast, he shares his superhero backstory and discusses his certifications, his education, and his career path. He also offers advice for those who would like to get into the field of cybersecurity and people thinking about writing a book.If you are considering a career in cybersecurity or if you are an engineer and want to specialize in cyber security, you will gain a lot from this podcast! Stay tuned for more!Show highlights:After leaving college, Pascal stayed with the company where he did his internship. The company got him to set up a software simulation to test their POC programs and later put him on their commissioning team. (6:51)Pascal talks about what he did while working as a controls engineer. (8:08)How Pascal got invited to move to the US to continue with his work. (9:50)Pascal explains how many doors opened for him after presenting his first report in 2005. (12:27)Pascal talks about how security measures first intersected with his work in 2008-2009. (14:07)Pascal pinpoints the moment when he decided to change his career path. (16:00)Pascal offers advice for traditional engineers who want to improve what they do and join the cyber security workforce. (17:35)A Network Plus certification will help controls engineers understand the fundamentals of networking. (18:19) Pascal explains why he got hired as a commercial engineer in Network and Security at Rockwell. (21:16)Pascal talks about his book, Industrial Cybersecurity. (23:39)The book Hacking Exposed by Clint Bodungen inspired Pascal to write his first book. (27:50)How Threat GEN became a company based around a game Pascal developed. (29:10)Pascal offers advice on where people in IT who want to know more about safety, reliability, resiliency, and POCs can start. (32:36)The most successful companies have a combined IT and OT team with knowledgeable people on both sides. (36:43)Why do you need to figure out what you like the most and focus on that technology? (37:58)Architecture will be the next big step for monitoring everything. (45:06)Pascal discusses the process of writing his books and offers advice for those who would like to write a book. (45:49)Links:(CS)²AIPascal Ackerman on LinkedInIndustrial Cybersecurity by Pascal AckermanBooks mentioned:Hacking Exposed by Clint BodungenThe podcast and artwork embedded on this page are from Derek Harp, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Control System Cyber Security Association International: (CS)²AI
Derek Harp is happy to welcome Pascal Ackerman as his guest for today's podcast! Pascal is a security professional, focused on industrial control systems and he's currently the Sr Security Consultant for Operational Technology - Threat & Attack Simulation at GuidePoint Security. He has a Master's of Science degree in Electrical Engineering (MSEE/CE). He has had 18 years of experience in industrial Ethernet design and support, information and network security, risk assessments, pen-testing, forensics, and threat hunting, WAN/LAN/Internet and Wireless Technologies, Windows Environments, Unix, Linux, IIS, and Apache. He specialized in the architecture, engineering, and securing of plant-wide Ethernet networks using Purdue-model design strategies, IDS/IPS sensors, network monitoring, Security Information, and Event Management (SIEM) solutions, next-gen firewalls, MS domain services, WSUS servers, MS SQL server clusters, etc. Pascal was born and raised in the Netherlands. Right after leaving high school, he was put behind a POC by a company that sent him out across the world installing prototype machinery for filling machines. He is an engineer, programmer, gamer, hacker, traveler, tinkerer, pen-tester, and father. In this episode of the (CS)²AI Podcast, he shares his superhero backstory and discusses his certifications, his education, and his career path. He also offers advice for those who would like to get into the field of cybersecurity and people thinking about writing a book. If you are considering a career in cybersecurity or if you are an engineer and want to specialize in cyber security, you will gain a lot from this podcast! Stay tuned for more! Show highlights: After leaving college, Pascal stayed with the company where he did his internship. The company got him to set up a software simulation to test their POC programs and later put him on their commissioning team. (6:51) Pascal talks about what he did while working as a controls engineer. (8:08) How Pascal got invited to move to the US to continue with his work. (9:50) Pascal explains how many doors opened for him after presenting his first report in 2005. (12:27) Pascal talks about how security measures first intersected with his work in 2008-2009. (14:07) Pascal pinpoints the moment when he decided to change his career path. (16:00) Pascal offers advice for traditional engineers who want to improve what they do and join the cyber security workforce. (17:35) A Network Plus certification will help controls engineers understand the fundamentals of networking. (18:19) Pascal explains why he got hired as a commercial engineer in Network and Security at Rockwell. (21:16) Pascal talks about his book, Industrial Cybersecurity. (23:39) The book Hacking Exposed by Clint Bodungen inspired Pascal to write his first book. (27:50) How Threat GEN became a company based around a game Pascal developed. (29:10) Pascal offers advice on where people in IT who want to know more about safety, reliability, resiliency, and POCs can start. (32:36) The most successful companies have a combined IT and OT team with knowledgeable people on both sides. (36:43) Why do you need to figure out what you like the most and focus on that technology? (37:58) Architecture will be the next big step for monitoring everything. (45:06) Pascal discusses the process of writing his books and offers advice for those who would like to write a book. (45:49) Links: https://www.cs2ai.org/ ((CS)²AI) https://www.linkedin.com/in/pascal-ackerman-036a867b/ (Pascal Ackerman on LinkedIn) https://www.amazon.com/Industrial-Cybersecurity-Efficiently-cybersecurity-environment/dp/1800202091 (Industrial Cybersecurity by Pascal Ackerman) Books mentioned: https://www.amazon.com/Hacking-Exposed-Industrial-Control-Systems/dp/1259589714 (Hacking Exposed by Clint Bodungen) Mentioned in this episode: Our Sponsors: We'd like to thank our sponsors for their faithful...
A comprehensive cybersecurity strategy typically includes the use of modern, intelligent Security Information and Event Management (SIEM) platforms. These go far beyond simply aggregating and analyzing log files. Alexei Balaganski outlines the latest market developments based on his recently published Leadership Compass on "Intelligent SIEM Platforms" and explains the differences to other market segments together with Matthias.
A comprehensive cybersecurity strategy typically includes the use of modern, intelligent Security Information and Event Management (SIEM) platforms. These go far beyond simply aggregating and analyzing log files. Alexei Balaganski outlines the latest market developments based on his recently published Leadership Compass on "Intelligent SIEM Platforms" and explains the differences to other market segments together with Matthias.
InfosecTrain offers Cyber Security Training & Certification. To know more about Cyber Security course and other training we conduct, please visit https://www.infosectrain.com/courses/ or write into us at sales@infosectrain.com or call us at +91-97736-67874 #siem #OSSIMfundamentals #CyberSecurity Agenda of the Session • SIEM Methodologies Garner's magic quadrant, SIEM guidelines and architecture, baselining with correlation of logs and events will be discussed. • Splunk In-Depth Industrial requirements of Splunk in various fields, Splunk terminologies, search processing language and various industry use cases. • AlienVault OSSIM fundamentals AlienVault fundamentals and architecture deployment. Vulnerability scanning & monitoring with OSSIM. • Incident response Mitre and ATT&CK for better understanding and defending.
What began as a tool for helping organizations achieve and maintain compliance, security information and event management , SIEM rapidly evolved into an advanced threat detection practice. SIEM has empowered incident response and security operations centers (Soc) analysts as well as a myriad of other security teams to detect and respond to security incidents. While there may be talk about SIEM joining the line of legacy technologies that are proclaimed "dead", SIEM has been a core system for many security teams, and in different capacities. Furthermore, SIEM (along with its evolution) has been intertwined with relevant threats in the ecosystem as well as the market in which it is used. Systems and infrastructures that security professionals must secure in 2021 are vastly different from the systems in use when SIEM first came to the scene. But even if many have decided that SIEM is a thing of the past, its underlying principles and technology remain visible in many new systems such as SOAR, XDR, MDR and other solutions that integrate SIEM capabilities. Vendors and reimaginations come and go, but SIEM prevails as a technology that should be recognized. There will always be a need for experienced individuals to work with SIEM and know how to apply it to the appropriate business touchpoints. We've put together an overview of the history, definition, use cases as well as benefits and limitations of SIEM to provide a greater understanding of its continued usefulness in any security team's toolstack. What is SIEM? SIEM stands for security information and event management. It provides organizations with detection, analysis and response capabilities for dealing with security events. Initially evolving from log management, SIEM has now existed for over a decade and combines security event management (SEM) and security information management (SIM) to offer real-time monitoring and analysis of security events as well as logging of data. SIEM solutions are basically a single system, a single point that offers teams full visibility into network activity and allows for timely threat response. It collects data from a wide range of sources: user devices, servers, network equipment and security controls such as antivirus, firewalls, IPSs and IDSs. That data is then analysed to find and alert analysts toward unusual behavior in mere seconds, letting them respond to internal and external threats as quickly as possible. SIEM also stores log data to provide a record of activities in a given IT environment, helping to maintain compliance with industry regulations. In the past, SIEM platforms were mostly used by organizations to achieve and maintain compliance with industry-specific and regulatory requirements. What brought about its adoption across many organizations was the Payment Card Industry Data Security Standard (PCI DSS) and similar regulations (HIPAA). As advanced persistent threats (APTs) became a concern for other, smaller organizations, the adoption of SIEM has expanded to include a wide array of infrastructures. Today's SIEM solutions have evolved to address the constantly shifting threat landscape, and is now one of the core technologies used in security operations centers (Soc). Advancements in the SIEM field are bringing forward solutions that unify detection, analysis and response; implement and correlate threat intelligence feeds to provide added intelligence to Socs; and include or converge with user and entity behaviour analytics (UEBA) as well as security orchestration, automation and response (SOAR). How does a SIEM solution work? A SIEM solution works by collecting security event-related logs and data from various sources within a network. These include end-user devices, web, mail, proxy and other servers, network devices, security devices such as IDS and IPS, firewalls, antivirus solutions, cloud environments and assets, as well as all applications on devices. All of the data is collected and analyzed in a centralized loca...
Security Information and Event Management (SIEM) is a part of an organization's big data analytics toolset. Effective cyber security approaches require a tool to effectively manage and control attacks to their systems. The level of sophistication of attacks and the the sheer scale of attacks require a level of automation that wasn't readily available even a decade ago. Now, big data analytics tools offer a SIEM solution as part of its offering, providing security experts with the functionality that they need to get ahead, stay ahead and automatically respond to security threats. In this episode, Amyn Visram will share his knowledge on this important and quickly growing area within Information Technology. Skip Right to the Interview: 00:01:59 About Amyn Visram Amyn Visram is the founding principal and Senior Consultant at Halvis Consulting Inc. His company, headquartered in Calgary, provides Splunk professional services to customers throughout North America and specializes in the best-practice design and delivery of Splunk machine data collection, data analytics, security, and information event management, and IT operations solutions, to name a few, for clients ranging from small businesses to Fortune 500 companies. Amyn has over thirty years of experience in the Information Technology industry and has had the opportunity to work with clients across the globe in a multitude of industries ranging from multinational oil companies to Silicon Valley startups to federal and provincial government agencies. Amyn's long history of consulting and providing smart, current solutions has enabled him to evolve in an ever-growing, constantly changing, industry. Connect with Amyn www.halvis.com LinkedIn
Today I will discuss: 1. Why are managing the logs a big trouble for the companies? 2. Why is SIEM so crucial for cybersecurity? 3. How does SIEM work? Watch
Paradyn, Ireland’s only end-to-end IT and communications service provider, has announced that it has implemented an advanced cybersecurity and network solution for Cork County Council in a €500,000 deal over the next three years. Having won a competitive tender process, Paradyn will provide security operation centre (SOC) as-a-service and network support to the council to help mitigate cyber risk for the local authority. Paradyn’s provides local and wide area networks (WAN) for Cork County Council, connecting its central office to its 100 regional office locations, as well as public libraries, fire stations and civic amenities throughout the county. The cybersecurity solution will help to protect users across one of the biggest wireless networks in Ireland. Paradyn’s dedicated cybersecurity team provides the council with 24/7 network monitoring from its recently launched TotalView Operations Centre based in Little Island, Cork. This proactive monitoring enables Cork County Council to quickly identify and resolve potential security risks or breaches before significant amounts of sensitive data can be compromised. The enhanced cyber defence mitigates security risks and reduces network downtime so council staff and citizens availing of public IT services, such as library or council office Wi-Fi hotspots, can enjoy a more reliable user experience. Paradyn’s security team leverages the latest Security Incident and Event Management (SIEM) software to identify, monitor, record and analyse security events anywhere on the council’s network in real-time. Outsourcing the management and security of its network to Paradyn has reduced the time spent by the council’s IT team on network upkeep by more than one-quarter – enabling it to focus on value-adding IT projects that enhance public services. In designing the network and security infrastructure, both Paradyn and Cork County Council implemented Centre for Internet Security (CIS) Controls – a set of prioritised security actions based on global consensus of best practice. Ranging from malware, email and web defences to employee awareness training and penetration testing, the controls help to protect the council against the most widespread cyber-attacks while aiding regulatory compliance with measures such as GDPR. Eileen Kelly, Cyber and IT Security Programme Manager, Cork County Council, said: “The nature of cyber-attacks has evolved to a point where reactive security measures alone are not enough. The proactive network monitoring provided by Paradyn enables us to keep a close eye on incidents on our network so we can identify issues before they have time to cause potentially huge financial and reputation damage. “Cybercriminals often target their attacks in out-of-office periods and it wasn’t feasible for us to internally monitor our network around the clock. Paradyn’s SOC-as-a-service means we have a cost-effective, 24/7 cyber defence in place. Our IT team can instead focus their efforts into enhancing the quality of our online services and user-experience for staff and members of the public right across the county.” Paul Casey, Chief Operations Officer, Paradyn, said: “By implementing global best practice controls, Cork County Council has taken a responsible and holistic approach to their security set-up. We’ve helped the council to navigate this journey to a robust level of IT security that will benefit all those who avail of the council’s services, as well as every employee using the council network daily. Our advanced cybersecurity support is ideally suited for local authorities. We will seek to implement this solution and emulate the strong example laid out by Cork County Council with other councils throughout Ireland.” More about Irish Tech News and Business Showcase here. FYI the ROI for you is => Irish Tech News now gets over 1.5 million monthly views, and up to 900k monthly unique visitors, from over 160 countries. We have over 860,000 relevant followers o...
DailyCyber The Truth About Cyber Security with Brandon Krieger
In today’s DailyCyber Podcast I discuss the top Cyber Security solution providers and the Cyber Security solutions that you should be aware of: Top Cyber Security Solution Providers Beyond TrustBlack Berry - CylanceCarbon BlackCheck Point Cisco CrowdstrikeCyberArk Dark TraceForce Point FortinetKnowBe4 IBMPalo AltoProofPoint RSA NetworksSymantecSplunk SophosTransmit SecurityTrendMicroVectra Top Cyber Security solutions Categories: SoftwareHardware Services/Consulting Different Solutions: -Data Loss Prevention-Identity and Access Management - IAM-Priviedge Access Management - PAM-Risk and compliance management -Encryption-Unified Threat Management (UTM)-Firewall -Antivirus/Antimalware Solutions -Intrusion Detection Systems (IDS)-Intrusion Prevention Systems (IPS)-Network Detection System (NDS)-Network Prevention System (NPS)-Disaster Recover -Email Security -End Point Security -Network Detection Security -Security Information and Event Management (SIEM) -Advance Threat Protection (ATP)-Cloud Access Security Broker -Secure Web Gateway -Internet of Things Security (IoT)-Network Access Control (NAC) To learn more watch the video or listen to the podcast www.DailyCyber.ca and comment below
LeetSpeak with Alissa Knight Episode 4: Security Information and Event Management (SIEM) and AlienVault USM/USM Anywhere Product Review Alissa Knight does a thorough review of AlienVault USM/USM Anywhere following their recent acquisition announcement by AT&T. Alissa decomposes the AlienVault ecosystem, helping you better understand what USM/USM Anywhere is; the agent-server-logger architecture, and its recent move to support federated cloud environments. Join Alissa Knight in this week's new episode of LeetSpeak where she demystifies Security Information and Event Management (SIEM) solutions and gives a product review of the AlienVault USM/USM Anywhere SIEM/UTM Solution.
Security Current podcast - for IT security, networking, risk, compliance and privacy professionals
How big a market is Security Analytics? If you ask our guest, Gartner Research VP Dr. Anton Chuvakin you'll hear that there actually is no specific or defined market called Security Analytics. He says that while there are technology providers offering products or services so labeled they all do somewhat different things in different ways. There are vendors who look at packets, others that look at logs or roles and those that look at malware among other things and they all carry a label of analytics but according to Dr. Chuvakin the fact that all of the vendors do different things indicates that there is no market that you can just go to and buy a security analytics product. Organizations need to self define what they want to analyze and then assemble the required pieces and perhaps integrate with a Security Information and Event Management (SIEM) system, which is in some cases is essential for aspects of security analytics to work. In any case, the buy versus build discussion becomes much more than binary. Dr. Chuvakin explores this largely undefined territory with Security Current's Vic Wheatman.
In November of 2014, hackers infiltrated Sony's computer network lifting terabytes of corporate data, human resources information, internal intel, films, corporate emails, and other valuable information. This led the corporate world to question how protected we really are from cyber attacks. In the 1990's, the only computer issue was viruses, but the attack vectors have since changed. Companies and individuals are now subject to spear phishing, spyware attacks, malware, drive-by downloads, and browsers. What steps are now necessary to keep hackers from accessing your valuable data? And on a separate but equally interesting subject for lawyers, who really was behind the Sony attack? In this episode of Digital Detectives, hosts Sharon Nelson and John Simek analyze the progression of data security over time, look into data loss prevention steps, and consider each potential suspect of the Sony hack. Nelson describes the internet security suites that have been developed to include protection from all different types of attacks. However, she explains, these security systems are unlikely to keep out a sophisticated and determined hacker who is specifically targeting a corporation, law firm, or individual. The newer systems simply try to detect the infiltration and respond to it, observing what data is compromised and trying to identify the hacker. Simek explains several systems that are being used for security including data loss prevention, intrusion detection, and Security Information and Event Management (SIEM) products which correlate data to figure out what's normal. Nelson and Simek then go on to analyze why Sony was attacked and who may have done it. The hosts explain security blogger Bruce Schneier's theories on the suspects ranging from an official North Korean military operation to a disgruntled ex-employee. Listen to the podcast to hear the hosts' strong case for who they think the hacker was. Nelson also reviews Sony's reaction to the security attack. Stay tuned until the end for the NSA's rumored ability to create a cyber defense system and the international implications of an automated cyber attack response.