Top 6 Identity Security Problems Overlooked by Companies

Top 6 Identity Security Problems Overlooked by Companies

In typical computing environments, an identity represents a one-to-one relationship between a carbon-based life and their digital presence. Their digital presence, however, can have multiple accounts, multiple credentials, and an infinite number of entitlements in electronic format. Consider the accounts associated with your personal identity and the myriad accounts associated with your corporate identity. These […]

Managing Privileged Access Hacking Threats

Privileged access is a game of managing risk, and breaches leveraging privileged access exploits will solidify as the ‘attack of choice’ this year. Privileged account credentials with connections to valuable systems give hackers access to critical systems without triggering any alarms, making those people and roles the ideal target for hackers. It’s no wonder that […]

Pocket Guide for Cloud SIEM Evaluation

SaaS-based applications have quickly become the norm in today’s modern business ecosystem. Undeniable savings, efficiency, flexibility, and scalability are fueling the nearly 20% year-over-year growth of the $85.1 billion SaaS market—with no sign of slowing down anytime soon. While productivity and marketing automation tools were early to the SaaS adoption wave, cloud-based software now spans all […]

National Cybersecurity Awareness Month: How Infosec Pros Can Involve

National Cybersecurity Awareness Month

Fall is a time defined by yearly rituals. For some of us, that means breaking out our favorite knit sweaters, indulging in pumpkin-flavored everything, or — in the immortal words of George Costanza — “shifting into soup mode.” The information security world has its own autumnal observance: National Cybersecurity Awareness Month (NCSAM), promoted each October by […]

SIEM Market Evolution And The Future of SIEM Tools

Security Information and Event Management (better known as SIEM): these five words are defined hundreds of ways by thousands of people. And since 2005, industry analysts have now effectively debated it through two pivots of what exactly answers the primary problems of SIEM. There’s a lot to be learned by watching a market like SIEM […]

SIEM Security Tools: Six Expensive Misconceptions

How next-gen SIEM security solutions increase time to value in a modern threat environment. The changing security landscape demands the most up-to-date solutions to ensure consistent management of attacks and vulnerabilities. In recent years, security information and event management (SIEM) solutions became the tool of choice for protecting assets and users, promising a flexible way […]

SOC Automation: Accelerate Threat Detection and Response with SIEM and SOAR

SOC Automation

At 3Columns, we have the opportunity to talk to security professionals from all types of organizations. Whether we’re conversing with our largest customers or a Security Operations Center (SOC) team of one, there are a few challenges we hear about again and again. We believe that the best solution to industry-wide struggles with threat detection and […]