Crowdsourced correlation search development in security information and event management (SIEM) tools such as Splunk is a best practice for security monitoring and user awareness. For some SIEM systems such as Splunk, IT power users or administrators can develop searches.… Continue reading
Anti-malware sandboxes have emerged as a key defensive weapon in cybersecurity. But what are they? In general, they’re appliance- or cloud-based services that capture an executable document, file or script and “detonate” the object in a virtual machine or emulator.… Continue reading
No one has fully figured out how to throw a security blanket over the enterprise mobile environment, that chaotic patchwork of geographies, carriers, operating systems, applications, device types and ownership models.
Any enterprise tackling web security for mobile devices must… Continue reading