Welcome to our

Cyber Security News Aggregator

.

Cyber Tzar

provide a

cyber security risk management

platform; including automated penetration tests and risk assesments culminating in a "cyber risk score" out of 1,000, just like a credit score.
Navigation
Return to Planet "Home"
Ordered/grouped:
Filter applied:
Current page:
Go to "Navigation Help" (page end)
Articles in this collection: 28

Source: Security Intelligence and Big Data

Articles recieved 28/04/2024
Article: Asset Management – Back To The Roots - published about 3 years ago.
Content: Asset management is one of the core components of many successful security programs. I am an advisor to Panaseer, a startup in the continuous compliance management space. I recently co-authored a blog post on my favorite security metric that is related to asset management: How many assets are in the environment? A simple number. A number that tells a c...
https://raffy.ch/blog/2021/03/31/asset-management-back-to-the-roots/ 
🔥🔥
 
Published: 2021 03 31 13:47:25
Received: 2024 04 28 00:23:13
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: A Logging History Lesson – From syslogd(8) to XDR - published almost 3 years ago.
Content: The log management and security information management (SIEM) space have gone through a number of stages to arrive where they are today. I started mapping the space in the 1980’s when syslog entered the world. To make sense of the really busy diagram, the top shows the chronological timeline (not in equidistant notation!), the second swim lane underneath cal...
https://raffy.ch/blog/2021/06/08/a-logging-history-lesson-from-syslogd8-to-xdr/ 
🔥🔥
 
Published: 2021 06 08 16:05:55
Received: 2024 04 28 00:23:12
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: How To Drive Value with Security Data – The Full Talk - published almost 3 years ago.
Content: Last week I keynoted LogPoint’s customer conference with a talk about how to extract value from security data. Pretty much every company out there has tried to somehow leverage their log data to manage their infrastructure and protect their assets and information. The solution vendors have initially named the space log management and then security informatio...
https://raffy.ch/blog/2021/06/12/how-to-drive-value-with-security-data-the-full-talk/ 
🔥🔥
 
Published: 2021 06 12 20:00:24
Received: 2024 04 28 00:23:12
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
00:23 Asset Management – Back To The Roots
🔥🔥
00:23 A Logging History Lesson – From syslogd(8) to XDR
🔥🔥
00:23 How To Drive Value with Security Data – The Full Talk
🔥🔥
Articles recieved 10/12/2023
Article: The Data Lakehouse Post 3 – Catching Up with The Latest Big Data Developments - published about 3 years ago.
Content: I recently wrote a post about the concept of the Data Lakehouse, which in some ways, brings components of what I outlined in the first post around my desires for a new database system to life. In this post, I am going to make an attempt to describe a roll-up of some recent big data developments that you should be aware of. Let’s start with the lowest laye...
https://raffy.ch/blog/2021/02/08/the-data-lakehouse-post-3-catching-up-with-the-latest-big-data-developments/ 
🔥🔥
 
Published: 2021 02 08 16:25:58
Received: 2023 12 10 04:21:09
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: Taking Inventory – Where Do We Stand With AI and ML in Cyber Security? - published almost 3 years ago.
Content: Before diving into cyber security and how the industry is using AI at this point, let’s define the term AI first. Artificial Intelligence (AI), as the term is used today, is the overarching concept covering machine learning (supervised, including Deep Learning, and unsupervised), as well as other algorithmic approaches that are more than just simple statisti...
https://raffy.ch/blog/2021/05/19/taking-inventory-where-do-we-stand-with-ai-and-ml-in-cyber-security/ 
🔥🔥
 
Published: 2021 05 19 22:04:11
Received: 2023 12 10 04:21:08
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: A Logging History Lesson – From syslogd(8) to XDR - published almost 3 years ago.
Content: The log management and security information management (SIEM) space have gone through a number of stages to arrive where they are today. I started mapping the space in the 1980’s when syslog entered the world. To make sense of the really busy diagram, the top shows the chronological timeline (not in equidistant notation!), the second swim lane underneath cal...
https://raffy.ch/blog/2021/06/08/a-logging-history-lesson-from-syslogd8-to-xdr/ 
🔥🔥
 
Published: 2021 06 08 16:05:55
Received: 2023 12 10 04:21:08
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: How To Drive Value with Security Data – The Full Talk - published almost 3 years ago.
Content: Last week I keynoted LogPoint’s customer conference with a talk about how to extract value from security data. Pretty much every company out there has tried to somehow leverage their log data to manage their infrastructure and protect their assets and information. The solution vendors have initially named the space log management and then security informatio...
https://raffy.ch/blog/2021/06/12/how-to-drive-value-with-security-data-the-full-talk/ 
🔥🔥
 
Published: 2021 06 12 20:00:24
Received: 2023 12 10 04:21:08
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
04:21 The Data Lakehouse Post 3 – Catching Up with The Latest Big Data Developments
🔥🔥
04:21 Taking Inventory – Where Do We Stand With AI and ML in Cyber Security?
🔥🔥
04:21 A Logging History Lesson – From syslogd(8) to XDR
🔥🔥
04:21 How To Drive Value with Security Data – The Full Talk
🔥🔥
Articles recieved 19/01/2023
Article: The Data Lakehouse Post 2 – The Data Lakehouse Itself - published about 3 years ago.
Content: In my previous blog post, I ranted a little about database technologies and threw a few thoughts out there on what I think a better data system would be able to do. In this post, I am going to talk a bit about the concept of the Data Lakehouse. The term ‘data lakehouse‘ has been making the rounds in the data and analytics space for a couple of years. It d...
https://raffy.ch/blog/2021/02/08/the-data-lakehouse-post-2-the-data-lakehouse-itself/ 
🔥🔥
 
Published: 2021 02 08 16:22:11
Received: 2023 01 19 19:41:17
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: The Data Lakehouse Post 3 – Catching Up with The Latest Big Data Developments - published about 3 years ago.
Content: I recently wrote a post about the concept of the Data Lakehouse, which in some ways, brings components of what I outlined in the first post around my desires for a new database system to life. In this post, I am going to make an attempt to describe a roll-up of some recent big data developments that you should be aware of. Let’s start with the lowest laye...
https://raffy.ch/blog/2021/02/08/the-data-lakehouse-post-3-catching-up-with-the-latest-big-data-developments/ 
🔥🔥
 
Published: 2021 02 08 16:25:58
Received: 2023 01 19 19:41:17
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: A Security Product Reference Model - published about 3 years ago.
Content: On a recent consulting engagement with Cynergy Partners, we needed to decipher the security product market to an investment firm that normally doesn’t invest in cyber security. One of the investor’s concerns was that a lot of cyber companies are short-lived businesses due to the threats changing so drastically quick. One day it’s ransomware X, the next day i...
https://raffy.ch/blog/2021/04/16/a-security-product-reference-model/ 
🔥🔥
 
Published: 2021 04 16 21:30:24
Received: 2023 01 19 19:41:17
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: Taking Inventory – Where Do We Stand With AI and ML in Cyber Security? - published almost 3 years ago.
Content: Before diving into cyber security and how the industry is using AI at this point, let’s define the term AI first. Artificial Intelligence (AI), as the term is used today, is the overarching concept covering machine learning (supervised, including Deep Learning, and unsupervised), as well as other algorithmic approaches that are more than just simple statisti...
https://raffy.ch/blog/2021/05/19/taking-inventory-where-do-we-stand-with-ai-and-ml-in-cyber-security/ 
🔥🔥
 
Published: 2021 05 19 22:04:11
Received: 2023 01 19 19:41:17
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: How To Drive Value with Security Data - published almost 3 years ago.
Content: We have been collecting data to drive security insights for over two decades. We call these tools log management solutions, SIMs (security information management), and XDRs (extended detection and response) platforms. Some companies have also built their own solutions on top of big data technologies. It’s been quite the journey. At the upcoming ThinkIn co...
https://raffy.ch/blog/2021/06/03/how-to-drive-value-with-security-data/ 
🔥🔥
 
Published: 2021 06 03 16:55:18
Received: 2023 01 19 19:41:17
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: A Logging History Lesson – From syslogd(8) to XDR - published almost 3 years ago.
Content: The log management and security information management (SIEM) space have gone through a number of stages to arrive where they are today. I started mapping the space in the 1980’s when syslog entered the world. To make sense of the really busy diagram, the top shows the chronological timeline (not in equidistant notation!), the second swim lane underneath cal...
https://raffy.ch/blog/2021/06/08/a-logging-history-lesson-from-syslogd8-to-xdr/ 
🔥🔥
 
Published: 2021 06 08 16:05:55
Received: 2023 01 19 19:41:16
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: How To Drive Value with Security Data – The Full Talk - published almost 3 years ago.
Content: Last week I keynoted LogPoint’s customer conference with a talk about how to extract value from security data. Pretty much every company out there has tried to somehow leverage their log data to manage their infrastructure and protect their assets and information. The solution vendors have initially named the space log management and then security informatio...
https://raffy.ch/blog/2021/06/12/how-to-drive-value-with-security-data-the-full-talk/ 
🔥🔥
 
Published: 2021 06 12 20:00:24
Received: 2023 01 19 19:41:16
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: *NIX Command Line Foo - published over 1 year ago.
Content: Well, not one of my normal blog posts, but I hope some of you geeks out there will find this useful anyways. I will definitely use this post as a reference frequently. I have been using various flavors of UNIX and their command lines from ksh to bash and zsh for over 25 years and there is always something new to learn to make me faster at the jobs I am do...
https://raffy.ch/blog/2022/11/27/nix-command-line-foo/ 
🔥🔥
 
Published: 2022 11 27 17:28:05
Received: 2023 01 19 19:41:16
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
19:41 The Data Lakehouse Post 2 – The Data Lakehouse Itself
🔥🔥
19:41 The Data Lakehouse Post 3 – Catching Up with The Latest Big Data Developments
🔥🔥
19:41 A Security Product Reference Model
🔥🔥
19:41 Taking Inventory – Where Do We Stand With AI and ML in Cyber Security?
🔥🔥
19:41 How To Drive Value with Security Data
🔥🔥
19:41 A Logging History Lesson – From syslogd(8) to XDR
🔥🔥
19:41 How To Drive Value with Security Data – The Full Talk
🔥🔥
19:41 *NIX Command Line Foo
🔥🔥
Articles recieved 12/06/2021
Article: How To Drive Value with Security Data – The Full Talk - published almost 3 years ago.
Content: Last week I keynoted LogPoint’s customer conference with a talk about how to extract value from security data. Pretty much every company out there has tried to somehow leverage their log data to manage their infrastructure and protect their assets and information. The solution vendors have initially named the space log management and then security informatio...
https://raffy.ch/blog/2021/06/12/how-to-drive-value-with-security-data-the-full-talk/ 
🔥🔥
 
Published: 2021 06 12 20:00:24
Received: 2021 06 12 21:04:56
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
21:04 How To Drive Value with Security Data – The Full Talk
🔥🔥
Articles recieved 08/06/2021
Article: A Logging History Lesson – From syslogd(8) to XDR - published almost 3 years ago.
Content: The log management and security information management (SIEM) space have gone through a number of stages to arrive where they are today. I started mapping the space in the 1980’s when syslog entered the world. To make sense of the really busy diagram, the top shows the chronological timeline (not in equidistant notation!), the second swim lane underneath cal...
https://raffy.ch/blog/2021/06/08/a-logging-history-lesson-from-syslogd8-to-xdr/ 
🔥🔥
 
Published: 2021 06 08 16:05:55
Received: 2021 06 08 17:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
17:04 A Logging History Lesson – From syslogd(8) to XDR
🔥🔥
Articles recieved 06/06/2021
Article: No Really – What’s AI? - published about 4 years ago.
Content: Last week I was speaking on a panel about the “Use of AI for Cybersecurity” at the Intelligence and National Security Alliance (INSA) conference on “Building an AI Powered Intelligence Community”. It was fascinating to listen to some of the panels with people from the Hill talking about AI. I was specifically impressed with the really educated views on i...
https://raffy.ch/blog/2020/03/09/no-really-whats-ai/ 
🔥🔥
 
Published: 2020 03 10 03:30:59
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: Use of AI for Cyber Security in the Intelligence Community - published about 4 years ago.
Content: This post is about capturing my talking points from the recent conference panel on the “Use of AI for Cybersecurity” at the Intelligence and National Security Alliance (INSA) conference. You can find my musings on the term AI in my previous blog post. Building an AI Powered Intelligence Community (Click image for video) Here is the list of topics I inje...
https://raffy.ch/blog/2020/03/16/use-of-ai-for-cyber-security-in-the-intelligence-community/ 
🔥🔥
 
Published: 2020 03 16 14:47:13
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: The Data Lakehouse Post 1 – My Database Wishlist – A Rant - published over 3 years ago.
Content: In 2015, I wrote a book about the Security Data Lake. At the time, the big data space was not as mature as today and especially the intersection of big data and security wasn’t a well understood area. Fast forward to today, people are talking about to the “Data Lakehouse“. A new concept that has been made possible by new database technologies, projects, and ...
https://raffy.ch/blog/2021/02/02/the-data-lakehouse-post-1-my-database-wishlist-a-rant/ 
🔥🔥
 
Published: 2021 02 02 23:18:40
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: The Data Lakehouse Post 2 – The Data Lakehouse Itself - published about 3 years ago.
Content: In my previous blog post, I ranted a little about database technologies and threw a few thoughts out there on what I think a better data system would be able to do. In this post, I am going to talk a bit about the concept of the Data Lakehouse. The term ‘data lakehouse‘ has been making the rounds in the data and analytics space for a couple of years. It d...
https://raffy.ch/blog/2021/02/08/the-data-lakehouse-post-2-the-data-lakehouse-itself/ 
🔥🔥
 
Published: 2021 02 08 16:22:11
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: The Data Lakehouse Post 3 – Catching Up with The Latest Big Data Developments - published about 3 years ago.
Content: I recently wrote a post about the concept of the Data Lakehouse, which in some ways, brings components of what I outlined in the first post around my desires for a new database system to life. In this post, I am going to make an attempt to describe a roll-up of some recent big data developments that you should be aware of. Let’s start with the lowest laye...
https://raffy.ch/blog/2021/02/08/the-data-lakehouse-post-3-catching-up-with-the-latest-big-data-developments/ 
🔥🔥
 
Published: 2021 02 08 16:25:58
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: 2021 Cyber Security Focus: “Unbound” - published about 3 years ago.
Content: It’s already early March and the year is in full swing. Covid is still raging and we have been seeing some crazy weather patterns, especially in the south of the United States. While snowed in here in Texas, I took some time to reflect on what’s driving cyber security spend and customer focus this year. Overall, we can summarize the 2021 trends under the ter...
https://raffy.ch/blog/2021/03/03/2021-cyber-security-focus-unbound/ 
🔥🔥
 
Published: 2021 03 03 16:32:52
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: Asset Management – Back To The Roots - published about 3 years ago.
Content: Asset management is one of the core components of many successful security programs. I am an advisor to Panaseer, a startup in the continuous compliance management space. I recently co-authored a blog post on my favorite security metric that is related to asset management: How many assets are in the environment? A simple number. A number that tells a c...
https://raffy.ch/blog/2021/03/31/asset-management-back-to-the-roots/ 
🔥🔥
 
Published: 2021 03 31 13:47:25
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: A Security Product Reference Model - published about 3 years ago.
Content: On a recent consulting engagement with Cynergy Partners, we needed to decipher the security product market to an investment firm that normally doesn’t invest in cyber security. One of the investor’s concerns was that a lot of cyber companies are short-lived businesses due to the threats changing so drastically quick. One day it’s ransomware X, the next day i...
https://raffy.ch/blog/2021/04/16/a-security-product-reference-model/ 
🔥🔥
 
Published: 2021 04 16 21:30:24
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: Taking Inventory – Where Do We Stand With AI and ML in Cyber Security? - published almost 3 years ago.
Content: Before diving into cyber security and how the industry is using AI at this point, let’s define the term AI first. Artificial Intelligence (AI), as the term is used today, is the overarching concept covering machine learning (supervised, including Deep Learning, and unsupervised), as well as other algorithmic approaches that are more than just simple statisti...
https://raffy.ch/blog/2021/05/19/taking-inventory-where-do-we-stand-with-ai-and-ml-in-cyber-security/ 
🔥🔥
 
Published: 2021 05 19 22:04:11
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
Article: How To Drive Value with Security Data - published almost 3 years ago.
Content: We have been collecting data to drive security insights for over two decades. We call these tools log management solutions, SIMs (security information management), and XDRs (extended detection and response) platforms. Some companies have also built their own solutions on top of big data technologies. It’s been quite the journey. At the upcoming ThinkIn co...
https://raffy.ch/blog/2021/06/03/how-to-drive-value-with-security-data/ 
🔥🔥
 
Published: 2021 06 03 16:55:18
Received: 2021 06 06 09:04:46
Feed: Security Intelligence and Big Data
Source: Security Intelligence and Big Data
Category: Cyber Security
Topic: Cyber Security
09:04 No Really – What’s AI?
🔥🔥
09:04 Use of AI for Cyber Security in the Intelligence Community
🔥🔥
09:04 The Data Lakehouse Post 1 – My Database Wishlist – A Rant
🔥🔥
09:04 The Data Lakehouse Post 2 – The Data Lakehouse Itself
🔥🔥
09:04 The Data Lakehouse Post 3 – Catching Up with The Latest Big Data Developments
🔥🔥
09:04 2021 Cyber Security Focus: “Unbound”
🔥🔥
09:04 Asset Management – Back To The Roots
🔥🔥
09:04 A Security Product Reference Model
🔥🔥
09:04 Taking Inventory – Where Do We Stand With AI and ML in Cyber Security?
🔥🔥
09:04 How To Drive Value with Security Data
🔥🔥
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Navigation
Return to Planet "Home"
Ordered/grouped:
Filter applied:
Current page:
Go to "Navigation Help" (page end)
Articles in this collection: 28
  • "Home" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Authors is the most poorly serviced field in the articles we see from cyber security news providers.
  • Only Published Date selections use the articles Published Date (for ordering and grouping).
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • Return to the top of this page "Go Now"

Custom HTML Block

Click to Open Code Editor