Ineffective Security Investigations? Stop Blaming Your SIEM
Switching SIEM vendors would represent a material shift in investment for a company’s security team, yet not enough buyers are able to realize the full promise SIEM offers. Rather than vendor swapping, shouldn’t buyers work to close the gaps inherent in a SIEM solution?
Read moreEscaping the Wild West of Cyber Attacks
Deterrence plays a primary role in criminal law. Without it, our society could revert to the "Wild West" times. With the knowledge that they are not likely to be caught, individuals with criminal intent may be tempted to abuse others' resources for their own selfish benefits. How does this deterrence principle apply to crimes being committed through the Internet? And what would Cyber-Sheriff want in his cache to combat cybercrime?
Read moreBetaNews Q&A with WireX: How to Overcome Today’s Forensics Limitations
Organizations are increasingly under pressure to respond to security incidents quickly in order to minimise damage and losses. Yet conventional security approaches don't always provide enough information, or make it accessible enough, for this to happen.
Read more