Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Security Incident and Event Management.

Ep 38: Wheels up, systems down: cybersecurity at cruising altitude

In this episode of Masters of Data, we buckle up and explore the staggering technological complexity behind the airline industry, from managing IoT devices across global fleets to navigating the data chaos of mergers and acquisitions. We dig into the delicate balance airlines strike between aging legacy systems and risky upgrades, and why getting that wrong isn't just costly but potentially catastrophic. We also look at how forward-thinking airlines are turning operational logs into real business wins, all while safeguarding the mountains of sensitive passenger data they collect every day.

How To Build an Effective IT Disaster Recovery Plan

When weather forecasters predict hurricanes and blizzards, people rush to the grocery store for bread, milk, snacks, and water. While the snacks may be part of the storm preparation, the bread, milk, and water are part of the post-storm recovery. People know that they may experience power outages, water service disruption, or difficulty getting to stores. In short, the people plan how to recover in a disaster’s aftermath.

Add Context, Risk Scoring, and Automation to Microsoft Sentinel

Microsoft Sentinel gives security operations team visibility into activity across Microsoft environments. As those environments grow, many teams start looking for deeper behavioral context, more consistent investigations, and ways to reduce manual work without replacing what already works. That’s where the Exabeam Microsoft Sentinel Collector comes in.

What is the OWASP Top 10 for LLM Application Security

Initially published by the Open Worldwide Application Security Project (OWASP) in 2023, the Top 10 for LLM Application Security list seeks to bridge the gap between traditional application security and the unique threats related to large language models (LLMs). Even where the vulnerabilities listed have the same names, the Top 10 for LLM Application Security focuses on how threat actors can exploit LLMs in new ways and potential remediation strategies that developers can implement.

Your AI SOC still needs a SIEM. Here's why that won't change.

Everyone is building sophisticated intelligence layers with improved models and smarter agents to automate threat detection, investigation, and response. It’s what is needed in order to mature into an AI SOC. However, the organizations seeing the most value from AI in their SOC are not focusing solely on the intelligence layer. They’re focusing on the data foundation first.

The Golden Throne: Stop Blindly Flushing

Most folks build their SIEM the same way they load a junk drawer: by shoving in whatever they already have—Active Directory, firewalls, and a whole lot of “eh, why not.” But at Graylog, we think you deserve better than a glorified log toilet. In this talk, we’ll flip the script: start with the problems you’re actually trying to solve, then figure out what you need to know, then what data supports that. And with Graylog’s Intelligent Data Routing, you can now act on that plan—sending high-value data to hot storage and archiving the rest to standby storage for when (and if) it’s needed. Build your SIEM like it has a brain—and a budget.

Falcon Next-Gen SIEM & Onum: Real-Time Telemetry Control and Federated Search

Discover how Falcon Onum and Falcon Next-Gen SIEM work together to optimize telemetry upstream and enable federated search across hot and archived data. Reduce ingestion overhead, maintain full visibility, and investigate across multiple data stores from a single platform.