The Anatomy of a Modern SIEM

The Anatomy of a Modern SIEM

By Abhishek Sharma, Senior Technical Marketing Engineer at Securonix The 8 Critical Features of a Modern SIEM The cybersecurity landscape is getting more complex. Hackers continue to innovate, and business technologies generate increasing amounts of data. This is making legacy security information and event management (SIEM) solutions obsolete as they...

Security as a Service? Making managing a complex threat environment look easy.

Intellyx BrainBlog for Securonix by Jason English Comprehensive, proactive, responsive security practices were once the exclusive realm of larger companies and government institutions, with the capital and personnel to invest in running SecOps control rooms staffed with security experts. Fortunately, those centralized control days are long gone. We are erasing...

Solve Your Healthcare Security Challenge Using Next-Gen SIEM

Healthcare organizations are aware of the extremely sensitive nature of, and consequently the importance of, protecting patient data. Due to the value of personal health information (PHI), healthcare organizations are under attack from both external and internal threats. External attackers, drawn by the monetary value of PHI, employ increasingly sophisticated...

Threat Hunting Architecture

By Rohit D. Sadgune, Senior Security Solution Engineer, Securonix   Introduction Threat hunting is an essential skill for organizations with mature security operations centers. In this blog I will lay out an essential framework for the two different classifications of threat hunting as well as several threat hunting models that...

Why accurate attack attribution is critical in cybersecurity

  By Igor Baikalov, chief scientist at Securonix   Read this article on SC Magazine UK   The Internet favours anonymity by design. Despite being an obvious boon to cybercriminals and terrorists, anonymity has long been touted to be a worthy price to pay for supporting the foundations of democracy: privacy...

Securonix Threat Research: Detecting Persistent Cloud Infrastructure/Hadoop/YARN Attacks Using Security Analytics: Moanacroner, XBash, and Others

By Oleg Kolesnikov and Harshvardhan Parashar, Securonix Threat Research Team   Figure 1: Moanacroner Establishes Persistence After Initial Cloud YARN/Hadoop Infection Using Crontabs   Introduction In recent months, we have been observing an increase in the number of automated attacks targeting exposed cloud infrastructure/Hadoop/YARN instances. Some of the attacks we...

The Top Seven Cybersecurity Horrors

…and how to protect yourself It’s Halloween! And before the night exposes the horrors from the netherworld, most of us still have to get through the wacky costumes at work. Just the same, the cybersecurity demons do not slow down, and our SOC superheroes must continue to save the world...