IT Security

April 21, 2021 To SIEM or Not to SIEM?

Information security leaders fully understand the importance of having a security incident and event management (SIEM) solution, but teams need to overcome three main challenges before considering purchasing a SIEM solution.

October 26, 2020 Chronicle Expands Its North American Presence by Partnering With Herjavec Group

Chronicle, Alphabet’s enterprise security company, expands its North American partner base with Herjavec Group, its first Canadian partner. Herjavec Group is the first service provider in Canada to be certified in, and provide access to, Chronicle’s security intelligence products.

August 06, 2020 Twilio Breach and Cloud Security

By exploiting a five-year-old configuration error, a hacker was able to access Amazon’s S3 cloud storage buckets on which Twilio’s code was loaded. As a result, customers were able to unknowingly download the modified code for twenty-four hours.

August 05, 2020 IBM Raises Price on Software Support; Shoves Customers Toward the Cloud

IBM is changing the terms of its ubiquitous Passport Advantage agreement to remove entitled discounts on over 5,000 on-premises software products, resulting in an immediate price increase for IBM Software & Support (S&S) across its vast customer landscape.

August 05, 2020 Qualys and Ivanti Partnership Boasts an Incredibly Robust Vulnerability Management Platform

Qualys VMDR and Ivanti have announced a new partnership dedicated to improving the detection and patching of vulnerabilities. Announced July 30, the Qualys and Ivanti Partnership have already gone live as an integrated component of the VMDR solution.

July 30, 2020 Malwarebytes Endpoint Detection and Response Rated #1 in Endpoint Protection Data Quadrant

Based on data collected from real users, Malwarebytes Endpoint Detection and Response (EDR) took the number one spot on SoftwareReviews’ Endpoint Protection Data Quadrant for its second consecutive year.

July 23, 2020 Organizations Report Higher Satisfaction When Switching to Software With an Info-Tech Award

Thinking about choosing a new software vendor but don't know where to start? Narrow down your shortlist by focusing on software that has received an Info-Tech Research Group award. New data from SoftwareReviews shows that organizations reported higher satisfaction when they switched to software that had received an Info-Tech award.

July 23, 2020 RiskSense Releases a Unified Infrastructure Security Risk Management Program

RiskSense announced on July 13 its new version of the cloud-delivered RiskSense risk management platform. The main draw of the program is its holistic risk calculation across CVEs and CWEs.

July 20, 2020 Microsoft (Finally) Patches DNS Vulnerability CVE-2020-1350

Microsoft has released a patch to address vulnerability CVE-2020-1350, a Windows DNS server remote code execution vulnerability. This vulnerability’s exploit is considered “wormable.” The vulnerability has also been in existence for the last 17 years.

July 20, 2020 Address the Root of Your Vulnerabilities in a Resource-Tight Period

Cyberthreats are omnipresent for any enterprise. Monitoring ingress and egress points while still conducting business is a balance security professionals attempt to strike. Couple this with the continued security issues around remote work during the pandemic, and security teams have their hands full.

July 15, 2020 Kenna Security Releases Tool for the Custom Benchmarking of Vulnerability Management Programs

On May 26, Kenna Security released its new Prioritization to Prediction Benchmark Survey. This free tool provides organizations with the ability to compare their vulnerability management programs to industry averages Kenna Security has compiled over the years.

July 10, 2020 Bomgar & BMC Team Up to Speed Trouble-Ticket Resolution

For organizations that experience time-sensitive incidents that must be resolved in the most optimal and efficient manner, Bomgar (Beyond Trust) and BMC Software may have the solution. The two vendors have teamed up to address a reduction in the time it takes to resolve problematic tickets and assist in lessening the impact of cyber threats to which all organizations are subjected.

July 10, 2020 Privileged Access Management (PAM) Misconceptions: Starting the Journey

During the first three months of the COVID-19 pandemic, many organizations realized the true value of IT and the role it played in ensuring ongoing business operations. In the world of the new normal, infrastructure investments are growing as a result of realized value and the pursuit of innovation, with IT leading the way. IT modernization investments include cloud technology, robotics, IoT, and automating tasks and processes. However, this modernization of IT presents additional opportunities for attackers to uncover security vulnerabilities.

July 10, 2020 How Will Work From Home Change Vulnerability and Patch Management for Businesses in the Future?

COVID-19 has changed a great deal about how businesses operate. From a security perspective, however, COVID-19 caught many businesses off guard. The shift from working in the office to working from home has made it difficult for security measures to keep pace. Specifically, how are businesses meant to maintain the same secure networks when their employees are no longer working in the office? Outside of the security of the IT departments, IT and security have a tough time ensuring that patching and vulnerability management remain at the forefront of a business’s priorities.

July 10, 2020 CallStranger Vulnerability Affects Billions of IoT Devices

A vulnerability named CallStranger has been discovered, which exploits the Universal Plug-and-Play (UPNP) protocol used by billions of internet-connected devices. These devices are found in our homes, offices, shops, and factories.

June 19, 2020 Rapid7 – Key Reasons Around Cloud-Native SIEM

In today’s world many security teams require a simplified holistic method to consolidate disparate log data, threat anomalies, and responses. Due to these pressured requirements, organizations across the world are adopting or considering cloud-native Security Information and Event Management (SIEM) solutions.

June 19, 2020 “Unsafe” Code Uncovered in Chrome Browser (and Chromium-Based Browsers)

Google has identified “unsafe” code in the Chromium web browser engine. This flaw introduces a potential vulnerability that effects Google Chrome, as well as all Chromium-based web browsers.

June 19, 2020 Azure Sentinel: What is it, What are the Four Key Security Fundamentals, and Why You Should Know About It

Microsoft’s cloud Security Incident Event Management (SIEM) solution leverages modern day enhancements such as Security Orchestration Automated Response (SOAR), Machine Learning (ML), and Artificial Intelligence (AI).

June 12, 2020 Global Security Information and Event Management Market Size Is Expected to Reach $6 Billion by 2026

KBV Research released its Global Security Information and Event Management (SIEM) Market Forecast report last month. In light of the recent COVID-19 pandemic, the SIEM market report highlights continued growth for the security solution and offers insights into how SIEM will continue to be essential for enterprises going forward.

June 09, 2020 CASB Vendors Up Their Threat Protection Game With Big-Name Threat Intelligence Collaborations

CASB vendors CipherCloud and Bitglass have both recently announced partnerships with big-name cyber threat intelligence (CTI) providers to improve the threat protection features of their products. The partnerships, with FireEye and CrowdStrike respectively, will bring industrial-strength CTI to their customers.

June 09, 2020 Making Sense of SIEM Pricing: Pricing by Data Volume

As the Security Information and Event Management (SIEM) market continues to grow, organizations now have more options than ever to decide which SIEM is right for them. While SIEM vendors continue to innovate, the final decision often comes down to price. In the second of this five-part series on SIEM pricing, we will dive into pricing by data volume.