Information security leaders fully understand the importance of having a security incident and event management (SIEM) solution, but teams need to overcome three main challenges before considering purchasing a SIEM solution.
Chronicle, Alphabet’s enterprise security company, expands its North American partner base with Herjavec Group, its first Canadian partner. Herjavec Group is the first service provider in Canada to be certified in, and provide access to, Chronicle’s security intelligence products.
By exploiting a five-year-old configuration error, a hacker was able to access Amazon’s S3 cloud storage buckets on which Twilio’s code was loaded. As a result, customers were able to unknowingly download the modified code for twenty-four hours.
IBM is changing the terms of its ubiquitous Passport Advantage agreement to remove entitled discounts on over 5,000 on-premises software products, resulting in an immediate price increase for IBM Software & Support (S&S) across its vast customer landscape.
Qualys VMDR and Ivanti have announced a new partnership dedicated to improving the detection and patching of vulnerabilities. Announced July 30, the Qualys and Ivanti Partnership have already gone live as an integrated component of the VMDR solution.
Based on data collected from real users, Malwarebytes Endpoint Detection and Response (EDR) took the number one spot on SoftwareReviews’ Endpoint Protection Data Quadrant for its second consecutive year.
Thinking about choosing a new software vendor but don't know where to start? Narrow down your shortlist by focusing on software that has received an Info-Tech Research Group award. New data from SoftwareReviews shows that organizations reported higher satisfaction when they switched to software that had received an Info-Tech award.
RiskSense announced on July 13 its new version of the cloud-delivered RiskSense risk management platform. The main draw of the program is its holistic risk calculation across CVEs and CWEs.
Microsoft has released a patch to address vulnerability CVE-2020-1350, a Windows DNS server remote code execution vulnerability. This vulnerability’s exploit is considered “wormable.” The vulnerability has also been in existence for the last 17 years.
Cyberthreats are omnipresent for any enterprise. Monitoring ingress and egress points while still conducting business is a balance security professionals attempt to strike. Couple this with the continued security issues around remote work during the pandemic, and security teams have their hands full.
On May 26, Kenna Security released its new Prioritization to Prediction Benchmark Survey. This free tool provides organizations with the ability to compare their vulnerability management programs to industry averages Kenna Security has compiled over the years.
For organizations that experience time-sensitive incidents that must be resolved in the most optimal and efficient manner, Bomgar (Beyond Trust) and BMC Software may have the solution. The two vendors have teamed up to address a reduction in the time it takes to resolve problematic tickets and assist in lessening the impact of cyber threats to which all organizations are subjected.
During the first three months of the COVID-19 pandemic, many organizations realized the true value of IT and the role it played in ensuring ongoing business operations. In the world of the new normal, infrastructure investments are growing as a result of realized value and the pursuit of innovation, with IT leading the way. IT modernization investments include cloud technology, robotics, IoT, and automating tasks and processes. However, this modernization of IT presents additional opportunities for attackers to uncover security vulnerabilities.
COVID-19 has changed a great deal about how businesses operate. From a security perspective, however, COVID-19 caught many businesses off guard. The shift from working in the office to working from home has made it difficult for security measures to keep pace. Specifically, how are businesses meant to maintain the same secure networks when their employees are no longer working in the office? Outside of the security of the IT departments, IT and security have a tough time ensuring that patching and vulnerability management remain at the forefront of a business’s priorities.
A vulnerability named CallStranger has been discovered, which exploits the Universal Plug-and-Play (UPNP) protocol used by billions of internet-connected devices. These devices are found in our homes, offices, shops, and factories.
In today’s world many security teams require a simplified holistic method to consolidate disparate log data, threat anomalies, and responses. Due to these pressured requirements, organizations across the world are adopting or considering cloud-native Security Information and Event Management (SIEM) solutions.
Google has identified “unsafe” code in the Chromium web browser engine. This flaw introduces a potential vulnerability that effects Google Chrome, as well as all Chromium-based web browsers.
Microsoft’s cloud Security Incident Event Management (SIEM) solution leverages modern day enhancements such as Security Orchestration Automated Response (SOAR), Machine Learning (ML), and Artificial Intelligence (AI).
KBV Research released its Global Security Information and Event Management (SIEM) Market Forecast report last month. In light of the recent COVID-19 pandemic, the SIEM market report highlights continued growth for the security solution and offers insights into how SIEM will continue to be essential for enterprises going forward.
CASB vendors CipherCloud and Bitglass have both recently announced partnerships with big-name cyber threat intelligence (CTI) providers to improve the threat protection features of their products. The partnerships, with FireEye and CrowdStrike respectively, will bring industrial-strength CTI to their customers.
As the Security Information and Event Management (SIEM) market continues to grow, organizations now have more options than ever to decide which SIEM is right for them. While SIEM vendors continue to innovate, the final decision often comes down to price. In the second of this five-part series on SIEM pricing, we will dive into pricing by data volume.