According to SANS most recent security analytics survey, organizations rely heavily on log management and SIEM platforms to collect a lot of data about security events but have trouble sifting through it in order to uncover problems that need immediate attention.
More specifically, survey participants could not pin-point and follow up on security events that indicate potential attacks in the massive amount of collected data.
How can organizations find “attack indicator” needles in their big data haystacks?
Listen to Episode 105 of our Security Slice podcast and hear Craig Young and Tim Erlin discuss the marketing origins of the term “big data,” the key differences between physical and digital theft, and the two items that should be on your security analytics shopping list.
Most Commented Posts
2020 Cybersecurity Landscape: 100+ Experts’ Predictions
Cyber Security Predictions 2021: Experts’ Responses
Experts’ Responses: Cyber Security Predictions 2023
Celebrating Data Privacy Day – 28th January 2023
Data Privacy Protection Day (Thursday 28th) – Experts Comments
Most Active Commenters
A worrying trend for Australians The Latitude Financial attack clearly…
It is not unusual for companies to keep hold of…
“First of all, it should be praised that Ferrari have…
These findings aren’t very surprising given that unpatched zero-days provide…
These figures from Mandiant highlight how attackers are continuing to…