Designing your security information and event management (SIEM) strategy can be very challenging, particularly in complex environments that depend on many systems and stakeholders. For security leaders, it may seem as though this work is never complete. Indeed, maintaining an effective SIEM program requires a cyclical approach of reviewing business objectives, planning detection and response…

It’s hard to escape the reality that every day, cyberthreats morph and expand, escalating the need to improve and tighten security operations and response practices. While it may feel overwhelming, there are ways to help level the playing field. Cognitive computing and machine learning are new technologies that can empower security practitioners to focus on…

Sometimes the more things change, the more they stay the same. Businesses are migrating from traditional on-premises maintenance of their hardware and software to software-as-a-service (SaaS) and cloud at record levels. But any evaluation of such a move must include more than just the obvious costs of hardware and software. When migrating security to the…

President Barack Obama has ordered U.S. intelligence agencies to conduct a full review of the cyberattacks that allegedly tried to disrupt this year’s election, as his successor Donald Trump casts doubt over Russia’s possible involvement. Obama’s homeland security advisor Lisa Monaco first mentioned the need for the review while speaking to reporters on Friday morning, according…

The OODA loop is a well established concept often used in security which originated in the military. OODA stands for Observe, Orient, Decide, Act. OODA is an iterative process because after each action you need to observe your results and any new opposing action. The idea is that if you can consistently get to the…