Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Spot Security: Detect, prioritize, and take action against threats

While many cloud security professionals spend their time remediating vulnerabilities as they appear, analyzing risks early and often can help them more efficiently strengthen their organization’s security posture. Yet doing so requires the right tools in place to detect, prioritize, and respond to current and potential threats to the cloud environment.

The Critical Role of Data in Cybersecurity: Why Incomplete Data Weakens Your Overall Program

In this live stream, CDW’s Brenden Morgenthaler and I discuss a foundational issue with many security programs — having the right data to detect issues and make fast decisions. Data drives every facet of security, so bad or incomplete data weakens your overall program. Watch the video or continue reading below to learn about these issues and the strategies we use to solve security’s data problem.

Sponsored Post

Airlines aiming to transform need modern Observability

The last decade has been nothing but a roller coaster ride for the airline industry. The pandemic has transformed it forever and now it needs to reevaluate its digital transformation priorities on how to manage traveler expectations. Taking it a step further, travelers buying behavior is changing farther as now they will want to book tickets while chatting with an AI interface. The transformation was already underway. In 2020, Google Cloud and Sabre announced a partnership to modernize Sabre. Recently, American Airlines announced their modern rebooking app launched in partnership with IBM. Lufthansa announced industry's first continuous pricing tailored to suit individual customer attributes.

Getting Started with Logz.io Cloud SIEM

The shortcoming of traditional SIEM implementations can be traced back to big data analytics challenges. Fast analysis requires centralizing huge amounts of security event data in one place. As a result, many strained SIEM deployments can feel heavy, require hours of configuration, and return slow queries. Logz.io Cloud SIEM was designed as a scalable, low-maintenance, and reliable alternative. As a result, getting started isn’t particularly hard.

What is log management in security?

Cyber crimes are expected to cost the world roughly $10.5 trillion per year by 2025, according to Cybersecurity Ventures. And these attacks don’t just cost money. Businesses impacted by these kinds of crimes can expect to experience not only financial losses but also loss of productivity, damage to their reputation, potential legal liabilities and more.

How to Cut Through SIEM Vendor Nonsense

If you’re in need of new SIEM tooling, it can be more complicated than ever to separate what’s real and what’s spin. Yes, Logz.io is a SIEM vendor. But we have people in our organization with years of cybersecurity experience, and they wanted to share thoughts on how best to address the current market. Our own Matt Hines and Eric Thomas recently hosted a webinar running through what to look out for titled: Keep it SIEM-ple: Debunking Vendor Nonsense. Watch the replay below.

Getting ahead of global regulations

In today’s world, the fitness of compliance and risk professionals is being tested like never before. Like the surfers who founded ServiceNow, we must find ways to get ahead of each new wave of federal and global regulations and ride as gracefully as we can—or wipe out. The key is to be proactive rather than reactive. No matter the regulation or resources at one’s disposal, the basic principles of establishing a strong compliance practice cannot be ignored.

Cyber Resilience: The Key to Security in an Unpredictable World

This live stream is a conversation between Ed Bailey and Jackie McGuire on the growing significance of cyber resilience in today’s digital landscape. You’ll learn what cyber resilience means, why it’s important, and how to manage and improve it in an increasingly unpredictable world. With cyber threats becoming more sophisticated and frequent, cyber resilience has become critical to protecting personal and business assets.

Dealing with Unknown Threats

The cybersecurity threat landscape facing every organization is constantly changing. Cybercriminals are always looking for new vulnerabilities to exploit or changing existing attack methods to bypass protections. They also go to great lengths to hide their activities within regular network traffic and application activity. The attack surface that organizations present to attackers is also in a constant state of flux.