Continuous Security Reporting using popular BI tools

Microsoft Power BI and Google Data Studio Both Microsoft Power BI and Google Data Studio are two robust data analytics tools that can help you visualize raw and complex data. Their easy-to-understand user interfaces are good options for creating reports and sharing them with your manager or colleagues. Create Security Reporting Dashboard Security teams are

Bridge the gap
Bridge the gap between security detection and response

The evolution of the Security Operation Center (SOC) Security Information and Event Management Platforms (SIEM) have gradually become the center of SOC operations. They create different and relevant security detections/alerts that security analysts have to evaluate. Usually, a tier 1 analyst performs the initial triage of SIEM alerts and escalates high-priority ones to tier 2

Talent Shortage 2022: Stretching Your Lean DevSecOps Team

[This is a guest post contributed by George Hamilton, director of product marketing at ChaosSearch. It was originally posted on the ChaosSearch blog here] The cybersecurity talent shortage is real. As of December 2021, a job-tracking database from the U.S. Commerce Department showed nearly 600,000 unfilled cybersecurity positions. And a 2021 study found that 57%

de-noise
Addressing Noisy Security Detections – A Complete Solution

Noisy security detections Modern cybersecurity teams are overwhelmed with alerts from a variety of systems such as SIEM, cloud, SaaS application, network, endpoint, etc. Many teams receive hundreds/thousands of alerts every day and large enterprises can receive millions daily. Security analysts are annoyed by repetitive false positives and are extremely concerned about false negatives caused

Investigation and Response for Unemployment Benefit Fraud Alerts

Among the many new challenges that the COVID-19 pandemic has brought to security analysts, a recent and very serious one is unemployment benefits fraud. Criminals are filing claims for benefits using the credentials of people who haven’t lost their job. They learn of it when they get a letter from the government about the status

The Gap between Security Detections and Response

The evolution of the Security Operation Center(SOC) Security Information and Event Management Platform (SIEM) have gradually become the center of SOC center. It creates a variety of interesting security detections(alerts) that security analysts have to respond to. Usually, a tier 1 analyst performs the initial triage of SIEM alerts and escalates high-priority ones to tier

Security Alert Fatigue

Security alerts are signals that are generated by security vendors or security analysts on certain things that are suspicious. A “False Positive” alert occurs when the security system mislabeled a non-malicious activity as an attack. Security alerts are overwhelming SOC centers today,  most of which are false positives.  In a recent report provided by Forrester,

Accelerate your business with ChatGPT
Artificial Intelligence for Cyber Security

The development of Artificial Intelligence has been one of the most impactful innovations in the past couple of  years. It has and will continue to have significant transformational impact on technology as well as humans. With massive amount of data, AI enables machine to become smarter and more intelligent over time and perform tasks on

DLP alerts management
How to investigate DLP Alerts

Data loss prevention (DLP) contain a set of policies to enable company to protect sensitive data of the organization. By monitoring email traffic, web protocols, digital media, network traffic, printer, cloud traffic, company can detect, investigate, and block suspicious data leakage either caused by insider threat or external threat. Due to the complexity of IT

Efficient Security Alerts Management with AI and Automation

Security alerts are incredibly important to quickly detect cyber-attacks, but today’ssecurity defense products can generate thousands of security alerts on any given day, leaving security analysts at a loss of which alerts to respond to, and potentially missing the most important ones.  Overwhelming of security alerts A study by the Ponemon Institute found that the average organization in

We are pleased to announce that DTonomy is now part of Stellar Cyber. The integrated solution will enhance cyber threat detection and response automation!

X