Exclusive security magazine: Stay ahead of security trends
Faced with a deluge of security and log information, enterprises are overwhelmed by different types of data and finding it harder to respond to potential security events. Interest in security information and event management (SIEM) is increasing as companies look to detect breaches earlier and limit damage, but information overload—false positives—and missed signs of advanced attacks continue to be major problems. Big data technologies and advanced analytics have promised to deliver better and more complete threat detection. Should these systems be combined with SIEM products, or is it time to move on? In our cover story, we report on realistic expectations with SIEM products and data analytics today, and what actions companies may want to consider going forward.
As some enterprises look to advanced analytics for help, we revisit the concept of “good enough” security in the wake of the Sony Pictures Entertainment hacking scandal. CISOs, chief technology officers, and IT security and risk managers weigh in: Will security management have greater influence on business risk decisions in light of the security implications going forward? We report our findings. Finally, we have all heard about the benefits of vulnerability rewards programs, but what about the risks? Organizations outside of the technology industry may not be convinced about the rewards of bug bounty programs. We explore both sides of the issue.