Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

XDR

Why XDR Should Be on Your Roadmap for SOC Success

Fighting modern adversaries requires having a modern security operations center (SOC), especially as organizations move to the cloud. To protect their estates against tomorrow’s threats, security professionals have often turned to more data sources and adding more security monitoring tools in their operations, both in the pursuit of maximizing their attack surface visibility and reducing time to detect and respond to threats.

LogSentinel: The power of XDR - Stay ahead of the curve

At this year's InfoSec conference hosted by Computer 2000, LogSentinel presented - “The power of #XDR -stay ahead of the curve” Asen Kehayov CEO and Nikolay Raychev CTO presented in depth the XDR trend in #cybersecurity and how LogSentinel SIEM accommodates conceptual architecture and improves the industry vision of #XDR.

The power of XDR - Stay ahead of the curve - Presentation

At this year’s InfoSec conference hosted by Computer 2000, LogSentinel presented – “The power of XDR-stay ahead of the curve” Asen Kehayov CEO and Nikolay Raychev CTO presented in depth the XDR trend in cybersecurity and how LogSentinel SIEM accommodates conceptual architecture and improves the industry vision of XDR.

Why XDR Must Start with EDR: Join the Discussion with CrowdStrike and Guest Forrester Research

In the cybersecurity industry, understanding the value and impact of the critical technology we use to keep organizations safe can often become lost in translation. This is undoubtedly the case with extended detection and response (XDR), where the continued misuse of the term has created more market confusion than clarity. The definition of XDR varies depending on who you ask.

Correlating Data across Multiple Security Systems and Tools with XDR

Gartner defines Extended Detection and Response (XDR) as “a SaaS-based, vendor-specific, security threat detection and incident response tool that natively integrates multiple security products into a cohesive security operations system that unifies all licensed components”. Simply put, the main component of XDR is the ability to correlate data across multiple security systems and tools for better detection and response.

Evolution of Cybersecurity: From Prevention to XDR and SOAR

Since the early days of computing, cybersecurity has been a top concern for businesses and organizations. Over the years, the nature of cybersecurity threats has changed dramatically, and so too must our approach to security. In this blog post, we'll take a look at the evolution of cybersecurity from prevention to XDR and SOAR. We'll also consider the implications of these changes for CIOs and business leaders alike.

Stories from the SOC - Detecting internal reconnaissance

Internal Reconnaissance, step one of the Cyber Kill Chain, is the process of collecting internal information about a target network to identify vulnerabilities that can potentially be exploited. Threat actors use the information gained from this activity to decide the most effective way to compromise the target network. Vulnerable services can be exploited by threat actors and potentially lead to a network breach. A network breach puts the company in the hands of cybercriminals.

AT&T Cybersecurity's Partner Program and SentinelOne enter managed XDR market with robust alliance

The partnership between these two market-leading vendors enables MSSPs around the world to fast-track cutting-edge MXDR services. AT&T, the leader in network and managed security services, and SentinelOne, the leader in next generation, autonomous endpoint protection, today announced a strategic alliance to help prevent cybercrime.