Micro Focus recognized by SIEM analysts as visionary and a leader as portfolio’s SaaS offering advances
SANTA CLARA, Calif. – Dec. 13, 2022 — CyberRes, a Micro Focus (LSE: MCRO; NYSE: MFGP) line of business, today provided a review of the past year…
Can threat intelligence be your trusted, reliable partner in your SecOps workflows? Now there is a high-quality threat intelligence feed that automatically integrates into your SOAR/EDR engines in auto-block mode. Threat intelligence plays a pivotal role…
Overview
Explosive growth of digitization and cloud adoption increased the threat landscape across different sources that include cloud, IoT, edge computing and many more.
Advanced threats evolved overtime that includes ransomware, attacks on cloud…
Intelligent Threat Detection and Response solution provides a platform for Detection, Hunting, Triage and Investigation of known and unknown threats along with Automated Response capabilities. This helps to strengthen your cyber resilience and gain comprehensive…
On rare occasions one will need to log into mysql from an ssh shell. To do this, run the following:
cd /opt/arcsight/logger/current/arcsight/bin
./mysql -u arcsight -p arcsight
When: Wednesdays across multiple time zones
Where: GoTo Webinar link provided to registered participants
Cost: Free
Register Now>
ArcSight SOAR is a leading Security Orchestration, Automation and Response Platform (SOAR) which combines orchestration…
To export Trends run the following commands:
DBTODUMP=arcsight
SQL="SET group_concat_max_len = 10240;"
SQL="${SQL} SELECT GROUP_CONCAT(table_name separator ' ')"
SQL="${SQL} FROM information_schema.tables WHERE table_schema='${DBTODUMP}'"
SQL…
Check out our new SecOps video that looks at 19 crticial use cases (chosen by a leading industry analyst) and demonstrates how ArcSight 2022 can help to achieve cyber resilience.
Check out the latest on-demand SecOps session that shows how ArcSight SIEM as a Service can help increase operational efficiency while reducing exposure time to threats.
Presented by Rob Brewer, Senior Security Operations Architect and Chris Hamm, SecOps…
Technical Insights for You
When: Wednesdays across multiple time zones
Where: GoTo Webinar link provided to registered participants
Cost: Free
Register Now>
This presentation is for administrators that are already familiar or have some training…
Technical Insights for You
When: Wednesdays across multiple time zones, beginning in January 2022
Where: GoTo Webinar link provided to registered participants
Cost: Free
Register Now>
Presenter: Radhakrishnan M; SEC Enablement
Currently…
Leading bank cuts daily volume of security alerts needing investigation by 90%, keeping security headcount flat while meeting rigorous regulatory requirements for digital banking services.
Complete Case Study
At a Glance
Industry Banking
Location…
Don't forget to register and attend the upcoming ArcSight User Group meeting next Tuesday, September 28. We'll have ArcSight experts on hand to discuss the entire ArcSight portfolio - it's an Ask Me Anything session! Our panelists have nearly 50 years…
read more at techbeacon
State of SecOps 2021: 5 trends that should shape your security approach
A dramatic increase in remote work, expanded use of the cloud, and a continuing shortage of security professionals continue to challenge companies…
April 1, 2022
These guides walk through adding SOAR to an existing ESM deployment. First, we’ll cover ESM content that needs to be configured. Next, we’ll install the ArcSight Platform “from the ground up” with CentOS 7.9 Minimal installed nodes. Then…
read more at brighttalk
Webinar: 2021 State of Security Operations: Insights and Implications
Learn how to get Insights and Implications into the “2021 State of Security Operations Report” in our new on-demand SecOps webinar.
Topics…
read more at microfocus
Taming the Security Alert Tsunami with Automation
If an org is running a Security Operations Centre (SOC) that is overwhelmed with a tsunami of alerts, then find out what to do about it with our new SecOps blog! …
read more at microfocus
Ransomware Reality and Survival
The ransomware kill chain usually consists of multiple tactics such as initial access, persistence, lateral movement, and exfiltration. For example, the most common ransomware attack…
read more at techbeacon
Secure your IoT: Why smart attack and insider threat detection is key
As we retrieve real-time data from IoT devices and count on it to be accurate, it is important to know that those devices are secure and transmitting…
Events
read more at brighttalk
Webinar: How to secure your IT systems when it comes to privileged access
Expires in 23 days
See how to secure your IT systems when it comes to privileged access with NetIQ in our new IAM…
read more at microfocus
ArcSight Intelligence teams with CrowdStrike in this Large Online Retailer Case Study
Read this new SecOps case study describing the effectiveness of ArcSight Intelligence for CrowdStrike to provide powerful threat…
When most people think about robotics, they think of large robot arms that package and move boxes. However, the future of the robots could be quite different. Julian Cerruti, our guest for this episode, works to develop the future of robotics -- AI enabled…