A Growth Strategy FrameworkThere are countless organic growth (i.e., not based on acquisitions or M&A) strategy frameworks in the industry. Every advisory firm has…Nov 18, 2024Nov 18, 2024
SOAR is dead, long live the SOARGartner recently published their 2024 Security Operations Hype Cycle. It pegs SOAR (Security Orchestration, Automation and Response) in the…Aug 7, 2024159Aug 7, 2024159
State of the TDIR Survey 2024Organizations overconfident in their TDIR ability despite huge blind spotsFeb 1, 2024Feb 1, 2024
Connecting The Dots With De-Facto Standards: How the XDR Alliance’s Open-Sourced CIM and API Specs…From tool interoperability, to integration and to collaborationAug 25, 20233Aug 25, 20233
10 Reasons SIEM Should Remain Dedicated to Security — Part 5We’ve seen many reasons already why SIEMs should be focused on Security. In this blog, we’ll address the simple question “Can’t we just…Jul 13, 2023Jul 13, 2023
10 Reasons SIEM Should Remain Dedicated to Security — Part 4Wrapping data considerationsJul 8, 20231Jul 8, 20231
10 Reasons SIEM Should Remain Dedicated to Security — Part 3Data ConsiderationsJul 5, 20231Jul 5, 20231
10 Reasons SIEM Should Remain Dedicated to Security — Part 2Different user needs implies different toolsJun 30, 2023Jun 30, 2023
10 Reasons SIEM Should Remain Dedicated to Security — Part 1The Diverging Needs of Security, IT Operations, and Application Performance ManagementJun 28, 202317Jun 28, 202317
Four Days of Gartner Security and Risk Management Summit in Four MinutesAfter four days in Washington D.C. — which is typically muggy in June, but this year it was smoky, too, due to the wildfires burning in…Jun 21, 2023Jun 21, 2023
The Dark Side of AI in Cybersecurity: Unveiling the Hidden DangersHaven’t blogged in a while, and today, we’re going to dive into a topic that has both fascinated and alarmed me — the potential problems…Apr 16, 2023Apr 16, 2023
Vendors are gonna vend: Don’t fall for cheap tricks from some SIEM vendorsFrustrated with the endless games and deceptive tricks that some information and event management (SIEM) vendors play? It’s time to gain…Feb 8, 2023Feb 8, 2023
The Strategic Value of Modular, App-centric Security Operations PlatformIntroductionOct 25, 2022Oct 25, 2022
A Crash Course on Security Analytics — And How to Spot a Fake UEBA From a Mile AwayCISOs interested in having a better understanding of security analytics, such as Machine Learning (ML) or User and Entity Behavior…Sep 12, 20221Sep 12, 20221
Security Automation is Real. Science Fiction is Not.The five phases of security automation, what is real and what is science fiction.Aug 12, 2022Aug 12, 2022
One week of Gartner Security & Risk Summit 2022 in 10 minutesMy good friend and colleague Sanjay Chaudhary and I were among the team representing Exabeam at the Gartner Security & Risk Summit 2022 in…Jun 14, 2022Jun 14, 2022
From TDR to TDIR — using tools to drive investigationsI think we can all agree that one of the primary responsibilities of a SOC is to efficiently bring the organization back to a known good…Sep 21, 2021Sep 21, 2021
Introducing the XDR Alliance!In a previous blog, I described why following the XDR newsfeed felt like watching a telenovela with always a more dramatic episode around…Aug 4, 2021Aug 4, 2021
Dazed and Confused by the XDR Telenovela?Confusing drama? Intrigue? Passion? Cliffhangers? Look no further than the XDR Telenovela and its never-ending stream of episodes.Jul 28, 2021Jul 28, 2021