Check Point plans to purchase an external risk management vendor led by an Israeli intelligence veteran to boost its SOC and managed threat intelligence capabilities. The proposed acquisition of Cyberint will make it easier for companies to defend against both internal and external cyberthreats.
The SIEM market is experiencing significant upheaval, with your go-to products being bought out, merged, or even dismantled. This wave of change might have you questioning the future landscape of your cybersecurity tools and whether your current security stack is still the best fit for your organization. In this...
In an era where cyber threats are increasingly complex and AI-driven, selecting the right SIEM solution is more critical than ever. The right SIEM can be the cornerstone of an effective cyber defense strategy. However, the decision-making process is layered with complexities, from evaluating your current technology...
Today’s three largest cybersecurity markets are endpoint security, network security, and identity. While there are other large cybersecurity markets, including email security, web security, cloud security, SIEM, and SOC, these three account for over 50% of the cybersecurity market and are a big part of any...
Clarence Worrell, senior data scientist, CERT Division of Carnegie Mellon University's Software Engineering Institute, discusses how machine learning transforms threat detection and highlights practical applications and emerging challenges in cybersecurity.
Arctic Wolf last week announced plans to buy SOAR platform provider Revelstoke in a move to boost Arctic Wolf's automated response capabilities and lay the groundwork for "deeply embedded" AI and machine learning. CEO Nick Schneider explained how the deal will benefit customers and drive innovation.
Summa Equity bought a majority stake in Logpoint to help the security operations firm expand in areas such as automation, detection and response, and attack surface management. The sustainable growth fund says the acquisition will allow the company to acquire technologies in adjacent areas.
According to the Forrester Wave issued in December 2022, the top challenge security analytics vendors face when bringing SIEM, SOAR and UEBA together is making it easy for customers to manage and maintain the offering, says Forrester analyst Allie Mellen.
The founding team behind SOAR vendor Demisto has started a passwordless authentication and user management platform company that caters to the developer community. Descope helps developers embed authentication in the application build process and competes with Auth0 in the CIAM space.
The latest edition of the ISMG Security Report analyzes why Meta has agreed to pay $725 million to settle a class-action lawsuit over users' personal data, how the median stock price dropped 40% among publicly traded security firms in 2022, and why an infrastructure change is needed in SOCs.
DevSecOps has been described as part strategy, part toolkit, part training and part cultural shift.
However, there’s no universal playbook on how to implement DevSecOps, and there can be conflict between DevOps prioritizing speed to market, functionality and revenue generation, versus SecOps striving to eliminate...
In this episode of "Cybersecurity Unplugged," Yonatan Khanashvili describes in detail how Golden Security Assertion Markup Language attacks occur and how SOC platforms with much greater capacity to cross-correlate data than legacy SIEMs can help defenders detect and hunt for them.
Devo has closed its Series F round and notched a $2 billion valuation to incorporate more capabilities into its SOC via acquisition. The company plans to use the $100 million to buy companies that will provide customers with additional intelligence on top of Devo's data for specific use cases.
Forrester analysts Allie Mellen and Jeff Pollard discuss their new research on the analyst experience, or AX. AX involves how security analysts perceive their interactions with security products, services and processes, and Mellen and Pollard say it can improve the SOC and security analyst workflow.
'Despite an arsenal of point products designed to block malware and threats and warn of vulnerabilities that can be exploited by attackers; it is no longer sufficient to rely on traditional defence techniques. While effective in some areas, these approaches are limited, with one of the most important gaps being the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing fraudtoday.io, you agree to our use of cookies.