United States Cybersecurity Magazine

ProcessBolt
From the Spring 2014 Issue

Near-Term Vision of IT Security Threat Monitors

Benjamin Shelton
| Nangwik Services

Don Tobin
|

Continuously updating, learning and optimizing in an ever-changing “threatscape” 
 As most information security professionals are aware, breaches go from initial point of entry to data extraction in a matter of hours or seconds, yet their detection, analysis, and remediation is usually measured in weeks. New techniques and approaches are needed to shrink this time difference. There is a forest of data to pour over, and today’s Security Information and Event Management (SIEM) tools are primarily passive receivers of data from a multitude of sources. In short, a SIEM is a . . .

Leave a Comment