While discussing the rollout of SIEM with many IT and cybersecurity professionals, we still encounter skepticism rooted in bad experiences with earlier generations of SIEM systems. Therefore, we asked Evgenia Lagutina, who has spent 10 years familiarizing herself with SIEM as a customer, integrator, and vendor, to describe the main misconceptions about these products and debunk them. Swipe through our cards to discover top misconceptions and practical experiences! Try the modern SIEM, Kaspersky Unified Monitoring and Analysis Platform, via this link: https://kas.pr/j66s
Kaspersky
Computer- und Netzwerksicherheit
Stadtkreis 1 Altstadt, Zurich 436.131 Follower:innen
Kaspersky. Bring on the Future.
Info
Our mission is simple – building a safer world. And in fulfilling that mission we aim to become the global leader in cybersecurity – by securing technology to make sure that the possibilities it brings become opportunities for each and every one of us. Bring on endless possibilities. Bring on a safer tomorrow.” - Eugene Kaspersky, CEO of Kaspersky https://www.kaspersky.com/about/company
- Website
-
https://kaspersky.com/
Externer Link zu Kaspersky
- Branche
- Computer- und Netzwerksicherheit
- Größe
- 5.001–10.000 Beschäftigte
- Hauptsitz
- Stadtkreis 1 Altstadt, Zurich
- Art
- Privatunternehmen
- Gegründet
- 1997
Orte
Beschäftigte von Kaspersky
-
Riccardo de Rinaldini
Head of Global Consumer Marketing at Kaspersky
-
Leonid Efremov
Senior DevOps Engineer
-
Eden Focante Teles
-
Siang Tiong (姚祥忠) YEO
I understand the cultural differences between various Asian and Western countries, I formulate strategies and operationalise it | APAC Leader |…
Updates
-
Simplify Your Network with Kaspersky SD-WAN! Effortlessly connect new locations, control your network from one console, cut costs, and ensure top security with automated traffic management. Scale up, stay secure, and optimize your network with ease! Find out more here: https://kas.pr/nk2u
-
We’re proud to share that we have successfully passed the SOC 2 Type II audit, a critical validation of our security standards and the integrity of our antivirus database service. Since 2019, we’ve consistently met the rigorous SOC standards, ensuring our antivirus database development and release processes are secure, reliable, and built to protect against unauthorized changes. By aligning with SOC’s core principles — security, availability, integrity, confidentiality, and privacy — we’re committed to delivering protection you can trust. Learn more: https://kas.pr/czm2
-
Has your company encountered a cybersecurity breach? If your company has experienced a cybersecurity incident requiring immediate response, contact us. Our Global Emergency Response Team will reach out to you as soon as possible. Report an incident now and get the expert help you need! ⇒ https://kas.pr/vc7j
-
Kaspersky Industrial Cybersecurity for Networks is an application designed to protect the infrastructure of industrial enterprises from information security threats, and to ensure uninterrupted process flows. Learn more & view the entire playlist with KICS for Networks: https://kas.pr/x55d #OTsecurity #OTcybersecurity #Kaspersky #KasperskyICS #KICS
-
🧙♀️ LLM phishing blunders As large language models gained popularity, cybersecurity experts predicted that this technology would be quickly applied to phishing. And they were right. Our research has uncovered numerous fraudulent websites with text generated by neural networks. Phishers love automation, and it seems these texts were not reviewed before publication. How else can you explain a phishing site's opening paragraph starting with the typical apology, "I’m sorry, but as an AI language model, I cannot..."? And this is not an isolated case. The attackers are generating not only the user-visible text but also the SEO tags and the entire HTML layout of the page. Based on certain signs, it appears that an automated process is used to interact iteratively with the language model until texts of sufficient length and other necessary components of the phishing site are obtained. To learn more about other telltale signs of language model-generated sites and whether such threats can be detected automatically, read on our Securelist article: https://lnkd.in/dyerJ5gV #news #threats #phishing #LLM #AI
-
Subscribe or Treat! 👻 How to stay on top of your online subscriptions and save money ⇒ https://kas.pr/8v8z
-
Is your company mentioned on the #darkweb? Data breaches are on the rise, posing serious risks to businesses of all sizes. If your sensitive information is exposed, reputational damage and financial loss can follow. Unlock key steps to protect your business with our #IncidentResponse playbook. Get it now ⇒ https://lnkd.in/dt53Ezme #Cybersecurity #ThreatIntelligence #Cyberthreat
-
🔒 Trusted Threat Intelligence built for your unique threat landscape! Get insights on threats by region, industry, and threat actors to stay a step ahead. Unlock top-rated cybersecurity solutions and expert guidance from global leaders. 🔗 Learn more: https://kas.pr/si2o
-
From Delayed Patching to Careless Outsourcers: How Compromise Assessment Identifies Flaws in Cybersecurity Architecture Even the most mature and technologically advanced cybersecurity approaches within an organization are not 100% reliable, and attackers often exploit defenders' mistakes. Our compromise assessment experts see this daily and have shared some typical cases: ⏺ A vulnerability in a web server was patched a month after publication and two days after Active Directory was compromised via this flaw. ⏺ Data leakage occurred from a contractor's laptop that did not adhere to corporate information security policies. ⏺ MSSP analysts missed an incident due to incorrectly configured and insufficiently verbose telemetry from the web server. ⏺ Incident response was not thorough enough, and some changes made by attackers preserved their access to the system, such as through malicious AD policies. More details can be found on Securelist: https://lnkd.in/d_sFbeJ5 These examples highlight that a proactive approach to cybersecurity, including compromise assessment, allows for continuous evaluation and improvement of security measures within an organization, reducing the risk of undetected compromises. #advice #cybersecurity #compromise #MSSP #vulnerability