Blog

Demystifying XDR

Published on November 10, 2020

Just like any other IT field, the cybersecurity market is driven by hype. And the current hype is called XDR - eXtended Detection and Response.   What exactly is XDR? It’s still in that phase where definitions vary between vendors and analyst firms, but the consensus seems to be that...

What do we mean by SaaS SIEM?

Published on October 29, 2020

The trend to move the SIEM to the cloud is very clear by now. Even vendors known to sell appliance-based products are now offering or (the slower ones) working on their cloud SIEM product. But one important thing to consider when selecting a cloud SIEM is knowing how "cloud native"...

Comprehensive Cloud Security Monitoring for Oracle Cloud Infrastructure

Published on October 26, 2020

As public cloud usage skyrockets, many vendors are offering compelling cloud infrastructure options. Oracle Cloud Infrastructure (OCI) is one such offering. Known for their excellent reputation in data management technology, more enterprises are adopting Oracle Cloud. But with increased adoption, attackers are increasingly interested in attacking cloud infrastructure. That’s why...

Effective Multi-Cloud Security Monitoring With Federated SIEM

Published on October 23, 2020

As more and more organizations move their infrastructure and IT services to the cloud, it is common to find questions about how to address multi-cloud and other hybrid scenarios when designing a security monitoring solution. Although a real SaaS SIEM can easily ingest data from multiple locations in a simple,...

Security Monitoring for the Top 10 AWS Threats

Published on October 22, 2020

Computing? Check. Analytics? Check. Artificial intelligence (AI)? Check. Networking? Check. Content delivery network? Check. Storage? Check. Load balancing? Check. Third party applications? Check. Robotics? Check. Quantum computing? Check. The array of capabilities that AWS offers today is mind-boggling. A self-sufficient, feature rich cloud environment, AWS makes it very easy to...

Consumer Privacy in California: CCPA Compliance With Securonix

Published on October 21, 2020

In 2018, California recognized that its citizens should have stronger control over their personal information and privacy, and created the California Consumer Privacy Act (CCPA), which gives California citizens several rights with respect to their personal data and its privacy. As of July 2020, enforcement of the CCPA began in...

Threat Hunting and Response Using YARA/Sigma

Published on October 18, 2020

Why does Securonix support YARA and Sigma formats? Cybersecurity professionals must navigate an ever-changing landscape of threats that no individual security engineer or organization can handle alone. To succeed, security professionals must work together to identify and resolve threats as a community and agree on common languages to effectively communicate...