Filter By:

Recent Blogs & Podcasts

Insights

\ Security Operations 



June 22, 2017 | Metrics and Reporting
By Rich Guida, IANS Faculty

 Choose Your Risk Metrics Wisely

We all know we need to measure information security risk appropriately, but what are the best methodologies and metrics to use? In this Ask-an-Expert written response, IANS Faculty Rich Guida explains how to use a risk register to identify critical metrics, and offers tips for gathering relevant data and handling reporting.

Read More »


May 3, 2017 | Security Analytics and Visualization
By Stephen McHenry, IANS Faculty

 Applying User and Entity Behavioral Analytics (UEBA) to Improve Security

As the market for user and entity behavioral analytics (UEBA) solutions continues to evolve, the need for these types of solutions will increase. At the same time, UEBA also poses challenges related to privacy, data security, policy and deployment/storage options. In this report, IANS Faculty Stephen McHenry examines the current state of the UEBA marketplace and offers some scenarios in which it could prove effective for organizations today and in the future. 

Read More »


March 7, 2017 | Security Operations Centers (SOCs)
By Mike Rothman, IANS Faculty

 Overcoming Resistance to SOC Data Collection

How can you run an effective security operations center (SOC) when operations won't provide you with the right data? In this Ask-an-Expert live interaction, IANS Faculty Mike Rothman outlines some potential reasons for operations' lack of cooperation and provides strategies for overcoming them.

Read More »


August 22, 2016 | Security Analytics and Visualization
By Dave Shackleford, IANS Faculty

 Assessing Tools for Data Lineage Visualization

Most tools for performing data lineage visualization fall into one of two categories: data analytics processing or fraud analytics. In this Ask-an-Expert written response, IANS Faculty Dave Shackleford details the top analytics processing and visualization tools, including some open-source options that can be used to analyze large quantities of logs and events.

Read More »


August 9, 2016 | Security Analytics and Visualization
By Dave Shackleford, IANS Faculty

 User Behavior Analytics: A Tools Overview

Over the past few years, a number of organizations have begun to implement a user behavior analytics program in an effort to combat things like insider threats. In this live Ask-an-Expert interaction with the security team at a large financial services organization, IANS Faculty Dave Shackleford assesses the current landscape of user behavior analytics tools and offers tips and pitfalls to consider when implementing such a program.

Read More »