{"id":5107,"date":"2023-06-01T10:27:53","date_gmt":"2023-06-01T15:27:53","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/?p=5107"},"modified":"2023-07-10T10:28:20","modified_gmt":"2023-07-10T15:28:20","slug":"it-security-operations-news-may-2023","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2023\/06\/01\/it-security-operations-news-may-2023\/","title":{"rendered":"IT Security Operations News &#8211; May 2023"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><a>Table of Contents<\/a><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Security Information and Event Managements Market Research | Industry Size USD 18.12 Billion by 2030<\/li>\n\n\n\n<li>Renewed Focus on Incident Response Brings New Competitors and Partnerships<\/li>\n\n\n\n<li>Cloud Security Consulting Services: Key Benefits, Trends &amp; Important Cloud Strategy Trends for 2023<\/li>\n\n\n\n<li>Aeries Technology Launches Cyber Security Managed Services Offering<\/li>\n\n\n\n<li>Imperva\u00ae Opens Network and Security Operations Centre in Singapore to Better Support APJ and Global Customers<\/li>\n\n\n\n<li>Mandiant\u2019s new solution allows exposure hunting for a proactive defense<\/li>\n\n\n\n<li>UltraViolet Cyber, Inc., announces its launch<\/li>\n<\/ul>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" width=\"16\" src=\"https:\/\/it.einnews.com\/pr_news\/627036656\/security-information-and-event-managements-market-research-industry-size-usd-18-12-billion-by-2030\">&nbsp;<strong>Security Information and Event Managements Market Research | Industry Size USD 18.12 Billion by 2030<\/strong><br><em>EIN News<\/em><br>Growing demand for security solutions that help organizations discover potential security risks &amp; vulnerabilities is predicted to fuel growth of SIEM market.<br><br>The size of the global security information and event management market, which was estimated to be worth $3.92 billion in 2020, is expected to increase to $18.12 billion by 2030, rising at a CAGR of 16.4% from 2021 to 2030.<br><br>Request Sample PDF Report at: https:\/\/www.alliedmarketresearch.com\/request-sample\/2313<br><br>What are factors driving security information and event management market?<br>\u2022 Increasing cybersecurity threats: As the number and complexity of cyber threats continue to rise, organizations are increasingly turning to SIEM solutions to help them detect and respond to these threats in a timely and effective manner.<br>\u2022 Regulatory compliance requirements: Many industries are subject to regulatory requirements that mandate the use of SIEM solutions to help protect sensitive data and systems.<br>\u2022 Rising cybersecurity budgets: Organizations are allocating more resources to cybersecurity, which is driving demand for SIEM solutions.<br>\u2022 Growing adoption of cloud-based SIEM solutions: Cloud-based SIEM solutions offer several advantages over on-premise solutions, including scalability, flexibility, and cost-effectiveness.<br>\u2022 Increasing adoption of IoT devices: The proliferation of IoT devices is increasing the attack surface for cybercriminals, and SIEM solutions are being used to help organizations monitor and secure these devices.<br>\u2022 Need for real-time threat detection and response: SIEM solutions provide real-time visibility into security events, enabling organizations to respond quickly and effectively to threats.<br>What are key trends in security information and event management market?<br><br>Cloud-based SIEM solutions<br>Advanced threat detection<br>Integration with other security solutions<br>Compliance automation<br>Threat intelligence sharing<br>Managed SIEM services<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/it.einnews.com\/pr_news\/627036656\/security-information-and-event-managements-market-research-industry-size-usd-18-12-billion-by-2030\">https:\/\/it.einnews.com\/pr_news\/627036656\/security-information-and-event-managements-market-research-industry-size-usd-18-12-billion-by-2030<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" width=\"16\" src=\"https:\/\/n-cryptech.com\/wp-content\/uploads\/2022\/07\/cropped-n-cryptech-fav-icon-270x270.png\">&nbsp;<strong>Renewed Focus on Incident Response Brings New Competitors and Partnerships<\/strong><br><em>Kelly Springer<\/em><br><em>N-Cryp Tech News<\/em><br>In late March, Microsoft announced that the company would focus its generative AI offering, Copilot, on helping companies triage and respond to incidents, with an aim towards bolstering organizations\u2019 incident-response capabilities.<br>The company also announced that it would start offering incident response services and consulting on cybersecurity posture as a retainer to companies upon request.<br><br>The announcement marks a significant change at Microsoft.<br>In 2019, Microsoft labeled its incident response team \u2014 known then as the Detection and Response Team (DART) \u2014 as the \u201ccybersecurity team we hope you never meet.\u201d Now, the team hopes to meet clients on a regular basis.<br><br>Microsoft is not alone.<br>Incident-response services have taken off, and the companies that offer them are looking to build relationships rather than one-off engagements.<br>Google bought incident-response bellwether Mandiant in 2022, adding to its other IR-focused acquisitions Siemplify and Chronicle and its security advisory services.<br>Consulting firms Deloitte, Booz Allen, Kroll, and PricewaterhouseCoopers have long offered incident response, while managed service firms such as CrowdStrike and Secureworks have focused expertise.<br>Large business-technology and service firms \u2014 such as IBM, AT&amp;T, Verizon, and Palo Alto Networks \u2014 have also long been players in the IR space.<br><br>Corporate legal requirements and cyber-insurance policies have an outsized impact on incident response.<br>Often, the first call for an engagement comes not from an company executive, but from an outside counsel hired to handle the crisis (often because attorney-client privilege shields a company from legal discovery).<br>In other cases, an insurance company would bring in incident responders to help reduce the cost of recovering from a breach and to assess the security of a policyholder.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/n-cryptech.com\/renewed-focus-on-incident-response-brings-new-competitors-and-partnerships\/\">https:\/\/n-cryptech.com\/renewed-focus-on-incident-response-brings-new-competitors-and-partnerships\/<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" width=\"16\" src=\"https:\/\/www.data-mania.com\/blog\/wp-content\/uploads\/2021\/10\/Data-Mania-Favicon-300x300.png\">&nbsp;<strong>Cloud Security Consulting Services: Key Benefits, Trends &amp; Important Cloud Strategy Trends for 2023<\/strong><br><em>Data Mania<\/em><br>Increased Adoption Of Multi-Cloud And Hybrid Cloud Environments<br>Greater Focus On Data Privacy And Compliance<br>More Emphasis On Container Security<br>Growing Interest In Zero Trust Security<br>Cloud Threat Intelligence And Incident Response<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/www.data-mania.com\/blog\/cloud-security-consulting-services-key-benefits-trends-important-cloud-strategy-trends-for-2023\/\">https:\/\/www.data-mania.com\/blog\/cloud-security-consulting-services-key-benefits-trends-important-cloud-strategy-trends-for-2023\/<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" width=\"16\" src=\"https:\/\/1382778335.rsc.cdn77.org\/wp-content\/uploads\/2017\/09\/cropped-AITHORITY-300-x-70-LOGO-1-270x270.png\">&nbsp;<strong>Aeries Technology Launches Cyber Security Managed Services Offering<\/strong><br><em>Cision PR News<\/em><br><em>AI Thority<\/em><br>Aeries Technology, a global professional services and consulting partner for business leadership teams, private equity sponsors, and their portfolio companies, announced the launch of its cyber security managed services offering, giving companies access to world-class cyber security services and Information Security Management Systems (ISMS) designed to meet and exceed the standards of an enterprise-level Chief Information Security Officer at a lower cost of hiring in-house experts.<br><br>This new comprehensive offering includes a full array of cyber security initiatives such as governance, risk &amp; compliance frameworks, application security services, data security &amp; privacy services, cloud &amp; infrastructure security and more through a team of Aeries Technology professionals dedicated to keeping corporate digital assets safe and secure.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/aithority.com\/technology\/aeries-technology-launches-cyber-security-managed-services-offering\/\">https:\/\/aithority.com\/technology\/aeries-technology-launches-cyber-security-managed-services-offering\/<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" width=\"16\" src=\"https:\/\/www.times24h.com\/wp-content\/uploads\/2020\/10\/cropped-icon-times24h-270x270.png\">&nbsp;<strong>Imperva\u00ae Opens Network and Security Operations Centre in Singapore to Better Support APJ and Global Customers<\/strong><br><em>Kevin Le<\/em><br><em>Times 24H<\/em><br>Imperva, Inc.(@Imperva) unveils a Network and Security Operations Center (NOC\/SOC) in Singapore.<br>The NOC\/SOC will enable it to better understand the cyberattacks occurring in the region, and help customers more quickly navigate the complex business risks associated with those attacks.<br><br>This investment in a regional NOC and SOC will help our customers navigate complex security and compliance risks.<br>This NOC\/SOC joins its global network of NOC\/SOC\u2019s that provide 24\/7 protection and support to Imperva customers around the world, through its follow-the-sun model.<br><br>Today\u2019s NOC\/SOC opening follows the establishment of the Imperva office in Singapore in 2017, and the subsequent expansion of the Company\u2019s presence to Australia, China, India, Japan, and Taiwan.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/www.times24h.com\/imperva-opens-network-and-security-operations-centre-in-singapore-to-better-support-apj-and-global-customers\/\">https:\/\/www.times24h.com\/imperva-opens-network-and-security-operations-centre-in-singapore-to-better-support-apj-and-global-customers\/<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" width=\"16\" src=\"https:\/\/www.csoonline.com\/wp-content\/uploads\/2023\/06\/cso_breakthrough_penetration_testing_hammer_hitting_glass_by_photodisc_gettyimages-bu010600_binary_code_by_metamorworks_gettyimages-1029147330_2400x1600-100798328-orig.jpg?quality=50&amp;strip=all&amp;w=1024\">&nbsp;<strong>Mandiant\u2019s new solution allows exposure hunting for a proactive defense<\/strong><br><em>Shweta Sharma<\/em><br><em>CSO Online<\/em><br>Mandiant Proactive Exposure Management combines a suite of capabilities to effect exposure hunting, threat correlation, penetration testing, and real-time intrusion defense.<br>Mandiant\u2019s exposure management claims a holistic approach to enterprise security, as opposed to disparate point solutions, and includes scanning organizational assets to know what\u2019s exposed, who\u2019s targeting them, their ability to handle and attack, and if an attack is happening in real time.<br><br>Mandiant\u2019s new solution, as the first step, attempts to gain visibility into all the assets belonging to the organization by combining exposure discovery with global threat intelligence.<br>This will include business-critical asset discovery and classification, assessment for vulnerabilities, IOCs and misconfigurations, and exposure enumeration.<br><br>This attack surface visibility is achieved through Mandiant\u2019s in-house, industry-standard technologies like external attack surface management (EASM), cyberattack surface management (CAASM), and cloud security posture management (CSPM).<br><br>As the second leg of this approach, Mandiant\u2019s exposure management combines threat intelligence from various sources to educate security teams with an attacker\u2019s initial reconnaissance techniques and the entire attack lifecycle.<br>After identifying the scope of the attack surface and areas of the threat landscape to focus on, Mandiant\u2019s new solution offers a capability to continuously test and validate the effectiveness of the organization\u2019s security controls.<br><br>Mandiant also uses breach analytics to map IOCs to security events logged in a customer\u2019s environment.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/www.csoonline.com\/article\/3693452\/mandiants-new-solution-allows-exposure-hunting-for-a-proactive-defense.html\">https:\/\/www.csoonline.com\/article\/3693452\/mandiants-new-solution-allows-exposure-hunting-for-a-proactive-defense.html<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" width=\"16\" src=\"https:\/\/ai-techpark.com\/wp-content\/uploads\/2017\/11\/cropped-ai_fav-270x270.png\">&nbsp;<strong>UltraViolet Cyber, Inc., announces its launch<\/strong><br><em>PR Newswire<\/em><br><em>AI Tech Park<\/em><br>Created through the combination of four pioneering firms \u2014 Metmox, Mosaic451, Stage 2 Security, and W@tchTower \u2014\u202fUltraViolet Cyber brings together decades of expertise and experience at the forefront of security operations to enable organizations to access the full spectrum of managed security operations capabilities.<br>As an Achieve Partners portfolio company, UltraViolet Cyber prepares entry-level talent to succeed in cybersecurity careers by not only providing training, but also facilitating career launch for apprentices to positions at UltraViolet and UltraViolet clients.<br>UltraViolet Cyber is supporting this approach through its groundbreaking approach to unified security operations, combining the power of people with a cloud-native, microservices platform architecture.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/ai-techpark.com\/ultraviolet-cyber-inc-announces-its-launch\/\">https:\/\/ai-techpark.com\/ultraviolet-cyber-inc-announces-its-launch\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Table of Contents &nbsp;Security Information and Event Managements Market Research | Industry Size USD 18.12 Billion by 2030EIN NewsGrowing demand for security solutions that help organizations discover potential security risks &amp; vulnerabilities is predicted to fuel growth of SIEM market. The size of the global security information and event management&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[38],"tags":[],"class_list":["post-5107","post","type-post","status-publish","format-standard","hentry","category-security-operations"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/5107","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=5107"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/5107\/revisions"}],"predecessor-version":[{"id":5108,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/5107\/revisions\/5108"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=5107"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=5107"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=5107"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}