mlns='http://www.w3.org/1999/xhtml'>
| Dear John, In this Dark Reading Tech Digest we share the experiences of some top security practitioners as they navigate volumes of security data. You’ll get examples of how enterprises can cull this data to find the clues they need to help reveal a cyberattack. Here’s what’s inside: Navigating the Deluge of Security Data - System logs, security tools, network telemetry, endpoint, and mobile reports may all provide clues that help reveal a cyberattack. Some top security practitioners share their experiences. Overburdened SOC Analysts Shift Priorities - Many SOC analysts are starting to shut off high-alert features to keep pace with the volume, new study shows. Microsoft Debuts Azure Sentinel SIEM, Threat Experts Service - Services arrive at a time when two major trends are converging on security. Better Cybersecurity Research Requires More Data Sharing - Researchers at the Workshop on the Economics of Information Security highlight the cost savings of sharing cybersecurity data and push for greater access to breach information. Don’t Just Tune Your SIEM, Retune It - Your SIEM isn’t a set-it-and-forget-it proposition. Access to this Tech Digest is free when you register for the Dark Reading community. Just register by clicking on the link below. There's no cost, and it takes only a few minutes. Dark Reading community members: Click on the link below and login to read it today. |
|
|
|
We hope you enjoy this Dark Reading Tech Digest. Thank you, Tim Wilson Editor, Dark Reading | | DARK READING |
|
|
|
|