Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The Crucial Role of Log Management in Compliance

In today’s digital landscape, businesses face a multitude of regulatory requirements designed to safeguard sensitive data and protect individuals’ privacy. Compliance with regulations such as HIPAA, GLBA, CMMC, PCI, and others has become paramount, making it essential for organizations to have robust log management solutions in place.

A taxonomy of endpoint security detection bypasses

I often see “EDR” used as a synonym for “industry-leading endpoint security solution.” There are times when this is accurate, but there are also times when I believe that this generalization stymies discourse around current capability gaps in the endpoint security ecosystem. In this blog post, I want to share my personal taxonomy for endpoint security products — albeit one that perhaps confusingly reuses existing terminology.

Devo Platform 8.0 Release

2022 was a year of dramatic expansion for The Devo Platform. The enhancements of behavior analytics, workflow automation, and AI-driven threat detection have transformed the Devo Platform into a cloud-native, SIEM, UEBA, and SOAR solution. This gives security teams the visibility, high performance, and advanced analytics they need to respond quickly to threats and protect the business.

CISO Backgrounds and Considerations for 2023

The CISO role has evolved in recent years. CISO’s don’t come just from technical and security backgrounds anymore. Each organization has their own distinct vision for how to solve their security needs whether they are customer, regulatory, or industry driven. I started out my career as an external auditor, with the goal of becoming a CFO.

Building a Kubernetes purple teaming lab

Kubernetes, and containerization in general, has a wealth of benefits for many teams operating cloud-native applications. From a threat detection standpoint, however, it is often difficult for newcomers to this space to gain the relevant hands-on experience without trampling over production environments. The Sumo Logic team has previously authored articles on Kubernetes DevSecOps vulnerabilities and best practices as well as Kubernetes logging and monitoring.

Leveling Up Security Operations with Risk-Based Alerting

In life, you get a lot of different alerts. Your bank may send emails or texts about normal account activities, like privacy notices, product updates, or account statements. It also sends alerts when someone fraudulently makes a purchase with your credit card. You can ignore most of the normal messages, but you need to pay attention to the fraud alerts. Security is the same way.

What is the difference between XDR and SIEM?

Over the past twenty years, security information and event management (SIEM) platforms have been one of the key solutions for cybersecurity management, as they help security teams centralize attack and threat detection activities. The cybersecurity industry is now shifting towards a new type of solution known as extended detection and response (XDR). As the two technologies are similar and have overlapping capabilities, many people still don’t know how they differ.

Using Co-Managed SOC to Derive Maximum Value from a SIEM Investment

Security information and event management (SIEM) systems are crucial to cyber security, providing a solution for collecting and analyzing alerts from all manner of security tools, network infrastructure, and applications. But simply having a SIEM is not enough because to be truly effective, it must be properly configured, managed, and monitored 24x7.

Mastering CMMC Compliance with UTMStack: A Comprehensive and Technical Approach

Achieving and maintaining Cybersecurity Maturity Model Certification (CMMC) compliance is a critical requirement for organizations operating within the defense industrial base. As a comprehensive SIEM solution, UTMStack offers advanced features and capabilities that not only streamline the compliance process but also inspire confidence in security and protection.