Why Does Network Detection and Response (NDR) Matter? Introduction to the SOC Visibility Triad

Zerologon and the Role of Monitoring in Vulnerability Management

By Augusto Barros, Vice President of Solutions   Vulnerability management is one of the most basic security hygiene practices organizations must have in place to avoid being hacked. However, even being a primary security control doesn't make it simple to successfully implement. I used to cover VM in my Gartner days,...

DDLC - Detection Development Life Cycle

By Augusto Barros, Vice President of Solutions   Dr. Chuvakin has recently delivered another great blog post about "detection as code". I was glad to read it because it was the typical discussion we used have in our brainstorming conversations at Gartner. It had a nice nostalgic feeling :-). But it also...

NG SIEM?

By Augusto Barros, Vice President of Solutions   An interesting result from changing jobs is seeing how people interpret your decision and how they view the company you’re moving to. I was happy to hear good feedback from many people regarding Securonix, reinforcing my pick for the winning car in...

I'm Joining Securonix

By Augusto Barros, Vice President of Solutions, Securonix   I’m very happy to announce today I’m starting my journey with Securonix! I’ve spent the last five years working as an industry analyst, talking to thousands of clients and vendors about their challenges and solutions on security operations. During this time...

What's New in Securonix 6.3.1

Have you noticed an uptick in ransomware recently? Ransomware is commonly delivered by an email that tricks users into trusting a malicious file. Many of the most recent data breaches were initiated because a user fell victim to ransomware. Threats like ransomware, which focuses on compromising the user, have more...

Threat Hunting: Do lower search costs produce better results?

Intellyx BrainBlog for Securonix by Jason English   Companies now expect to acquire security tools on a pay-as-you go, OpEx basis, and vendors who didn’t start out as managed service providers are now trying to adapt their pricing models to more flexible ones for Hybrid IT environments. Maintaining premium pricing...

3 Proactive Ways to Find Hidden Threats: SearchMore

What if the enemy is already inside? In the SecOps world, detecting and responding to threats is only half the story. Sophisticated attackers know the weaknesses of SIEM platforms and other security software and will exploit those vulnerabilities every chance they get. Threat actors know that many legacy platforms can’t...