Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Sumo Logic

Beat the challenges of supply chain vulnerability

Supply chain disruptions have had a devastating impact on the global economy. Suppliers and consumers feel the sting from rampant inflation to product shortages and factory closures. One leading cause of supply chain disruption — a dramatic increase in cyberattacks — is a significant concern for CXOs and IT executives.

Automating insider threat monitoring

From ingestion of relevant data sources to automation around threat monitoring, the security engineering team at Netskope utilizes Sumo Logic as a key tool in the protection of their intellectual property. Join this session to learn how something that began as an idea for an easy-to-use dashboards developed into a near completely automated process for data collection and correlation for investigating suspicious activity.

Unboxing the SOC: Going from a SIEM to a comprehensive daily tool

See how you could take the initial steps of utilizing an out-of-the-box solution to the comprehensive SIEM tool that assists your SOC Team daily. Your organization could mirror Latitude’s journey with Sumo Logic and Cloud SIEM Enterprise. After watching this session, you’ll have insight into.

SIEM rule tuning to develop cyber situational awareness

Every organization runs at different levels of acceptable risk. When a SIEM rule generates an alert one company might deem it a critical risk while another will shrug it off as business as usual. Knowing how your organization runs and understanding your security posture can bring you improved cyber situational awareness.

CISO Challenges & opportunities in orchestrating the defense of the modern enterprise

Tune in to this lively panel dialogue with security industry thought leaders exploring how securing modern applications as a part of digital transformation is disrupting traditional security people, processes, and technology practices. Dave Frampton, VP/GM of the Security Business at Sumo Logic, will moderate a discussion with Yaron Levi, CISO of Dolby Labs, and Tyson Martin, Principal Security Advisor for AWS, on how CISOs can play both a good offense and defense to navigate this transition.

Find threats: Cloud credential theft on Windows endpoints

In today’s hybrid, multi-cloud environments, users and administrators connect to various cloud services using Command Line Interface (CLI) tools and web browsers. This post highlights the risks associated with unprotected and unmonitored cloud credentials which are found on endpoints, in file shares and in browser cookies. Get actionable and direct guidance around: In order to alert on and hunt for this malicious activity. Business workloads are increasingly undergoing a migration to the cloud.

How Sumo Logic helps you comply with the CERT-In Directions 2022

On April 28, 2022, the Indian Computer Emergency Response Team (CERT-In) published the CERT-In_Directions_70B_28.04.2022 — a new document that imposes strict requirements on service providers, organisations, and cybersecurity teams. The new directions caused many controversies, leading to CERT-In publishing two supplemental documents: frequently asked questions on cybersecurity directions and No. 20(3)/2022 CERT-In.

FedRAMP: The journey to cloud secure operations

For many years, the U.S. government was hesitant about moving data and applications to the public cloud. Concerns around security were prevalent. Today, cloud has become a central proposition of IT spend in government institutions. With the government urging federal agencies to move to the cloud for its agility, scalability, and cost efficiency, those agencies need access to FedRAMP®-authorized vendors.