Book description
Cybersecurity experts are overwhelmed, constantly on guard against malicious activity on their networks. Further complicating these external assaults are internal risks arising from simple errors, disgruntled employees, and outdated software configurations. Security experts today must act on the assumption that all applications, services, identities, and networks are under threat.
This report examines how security data lakes can complement or replace the traditional SIEM model. Author David Baum describes how to deploy a modern security data lake, using your organization's existing cloud data platform to deliver comprehensive visibility and powerful automation across multiple security use cases. Heads of cybersecurity, security operations, and data science will learn how to deliver comprehensive visibility and powerful automation across multiple security use cases.
This report helps you:
- Understand why legacy SIEM solutions fail to provide effective threat detection and response in diverse IT settings
- Discover how today's connected ecosystems simplify the creation, operation, and maintenance of a security data lake
- Invest in a cloud data platform that can handle a broad set of use cases
- Use your security data lake to gather all of your data, expand visibility into security risks and incidents, and automate responses to mitigate threats
Product information
- Title: Deploying a Modern Security Data Lake
- Author(s):
- Release date: July 2022
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781098134976
You might also like
book
The Security Data Lake
Companies of all sizes are considering data lakes as a way to deal with terabytes of …
book
Cloud Native Security Cookbook
With the rise of the cloud, every aspect of IT has been shaken to its core. …
article
From ChatGPT to HackGPT: Meeting the Cybersecurity Threat of Generative AI
Emerging generative AI technologies such as ChatGPT are putting new tools in the hands of hackers. …
book
ASP.NET Core Security
Secure your ASP.NET applications before you get hacked! This practical guide includes secure coding techniques with …