A quick summary of what you get in our new book "Applied Security Data Strategy - A Leader's Guide" -- 1. A hands on approach to security data strategy 2. Maturity scale to assess and evaluate where you currently are and how to get better 3. Lessons learned from people who were actively involved in data projects And much more I'll leave for you to find out yourself ??. View or download from: https://lnkd.in/da3swBcB
关于我们
Put your team’s focus back on catching attackers and let Abstract handle the heavy lifting of security data management. Our real-time streaming approach gives teams the breathing room to prioritize their security effectiveness instead. Abstract Security collects and routes data from cloud sources (such as AWS CloudTrail, Azure Activity Logs and GCP Audit Logs), removes unwanted noise, performs optimization, threat enrichment and normalizes data to OCSF schema in real-time before routing it to any SIEM or data lake of your choice. Get flexibility without the complexity!
- 网站
-
https://abstract.security
Abstract Security的外部链接
- 所属行业
- 计算机和网络安全
- 规模
- 11-50 人
- 类型
- 私人持股
- 创立
- 2023
- 领域
- cyber security、analytics、ai、machine learning、streaming data、observability、siem、detection和security operations
Abstract Security员工
动态
-
?? I'm happy to share that the "?????????????? ???????????????? ???????? ????????????????: ?? ????????????'?? ??????????" book that I authored alongside 9 other authors is ?????? ????????! (Link in comments because it doesn't load with photos.) #SecurityDataStrategy Marketing 101 would say "?????????? Abstract Security ?????????????????? ???? (???????? ?????? ????????????????????,??????????????????? ?????? ???????????????? ??????????) ?????? ???????? ???????? ???? ???????? ???? ???????? ?????????????? ???? ?????????? ?????? ????????????????." But coming from a technical background myself, I know how frustrating gating knowledge like this can be. As Jackie McGuire mentioned in one of her posts "..?????? ?????????????????????? ?????? ?????????????? ?????????????? ???????? ???????? ????????????, ??????????????????????, ?????? ?????????? ??????????????????????." It's time we collaborate too. So here's ?????? ???? ?????????? ?????????????????????? ?????????????????? ?????????? so we can all come together as a community - ? ???? ???????? ?????????????? - The external authors from all companies chose to come together voluntarily to write this guide as an educational resource and practical framework for the industry. None of them were paid to contribute or promote any product or platform. All opinions are based on personal experiences working with data. ? ???? ???????? ?????????????? - All the reviews from readers you see in the pictures are genuine and none of them were paid or have sponsored relationships. Different backgrounds, different roles, coming together for the industry. ? ???? ????????-?????? ?????????????? - The book is not gated, it doesn't ask for contact details to be downloaded. You can view it live or download without blockers. ? ?????? ?????????????? ???? ???? ??????????????????! - The electronic version of the book will soon be available on Barnes & Noble, Inc. and Amazon Kindle (just going through the publish process right now) A huge Thank You to the Authors, We did it!! -- Justin Borland Don Mallory Alan Czarnecki Ryan Moon Jon Oltsik Matt Carothers Paul Keim Alex Gilelach Greg Olmstead And a huge thank you to the early readers for your reviews and contributions! Melinda Marks Krista Case (Macomber) Francis Odum Nick Mullen Rick McElroy Lisa Ackerman Andrew Borene
-
-
-
-
-
+1
-
-
Hot off the presses! Just got my copy of Applied Data Security: A Leaders Guide from Abstract Security I love when we collaborate on books! Shout out to Aqsa Taylor Justin Borland Alex Gilelach Matt Carothers Don Mallory Greg Olmstead Jon Oltsik and other contributors This book unveils strategies and the mindset needed to protect what matters most. Get your copy today!
-
-
I was fortunate enough to get my hands on a pre-release, electronic copy of Abstract Security's "?????????????? ???????????????? ???????? ????????????????: ?? ????????????'?? ??????????" a few weeks ago, and yesterday the real thing arrived on my doorstep! Thanks again to Aqsa Taylor and the team at Abstract for giving me an opportunity to read and review this prior to release - it's a great resource for anyone in the data security trenches. The electronic version of the book is available on Abstract's website now (link below), and will soon be available to through Barnes & Noble and Amazon Kindle as well. https://lnkd.in/gEwYsfQc
-
-
?? “When I was just a little baby, sitting on my daddy’s knee… he pointed his finger at a little Data Strategy Book and said, ‘That’s gonna be the life of me…’” ?? It’s never too early to become a super defender! This week at Abstract Security, we released research to the community — and we did it differently ? We didn’t gate it. ? We didn’t pay the authors. ? We made it free for all. We trust that the community at large will benefit from the insights shared by the security visionaries and leaders who donated their time to collaborate on this important initiative. Speaking of collaboration — this has always been one of the founding principles at Abstract. In a previous life the team used to call me the ?? King of Collaboration because I drove a vision around community sharing of threat intelligence. At Abstract we have a mission deeply rooted in all of our collective success: ?? “Detect and stop adversaries who threaten our collective livelihood.” We are proud to be part of this community. And we believe the only way forward is together — beyond company motivations, political pressures, or vendor decisions. I’ve been in cyber since 2001 — back when Black Hat was at Alexis Park and RSA was still in San Jose — and I can say without a doubt: this community is second to none. This research is just the beginning. (And I don’t want to foreshadow, but I will… there’s much more to come.) I’m personally extremely proud of the work led by Aqsa Taylor and Justin Borland, and the amazing team they pulled together: Jon Oltsik Ryan Moon Matt Carothers Greg Olmstead Alan Czarnecki Paul Keim Don Mallory And much thanks for all the folks that have reviewed and given feedback and commentary. Melinda Marks Krista Case (Macomber) Francis Odum Nick Mullen Rick McElroy Lisa Ackerman Andrew Borene ?? Link in comments — give it a read and let us know what you think. #cybersecurity #community #detectandstop #datastrategy #builtnotbought #ExecutionMatters
-
-
?????? Do you see what I see? An event you do not want to miss!! We're super excited to support our awesome partner OmegaBlack at FutureCon CyberSecurity Events tomorrow in Philly! ?? Stop by and say hello to OmegaBlack and Abstract Security crew! Let's chat! ??
-
-
?? Attention security leaders!?? “?????????????? ???????????????? ???????? ????????????????: ?? ????????????’?? ??????????” is now available, all 115 pages completely for free! No sales call, no email, completely ungated. This one’s dedicated to the entire security community! ?? Get the link in the comments below! ???????? ???? ???????? ???????? ??????????? Over the past few months, we asked some of the best minds in security data pipelines to help us write the go-to guide for anyone trying to build a mature security data strategy in their organization. In the book, we cover the very real challenges behind too much security data and provide a practical toolkit designed to help organizations of all sizes and sectors—including finance, education, health, entertainment, government, and SaaS services. Inside, you’ll discover: ??? ?????? ?????? ?????????????? ???? ?? ???????????????????? ???????????????? ???????? ????????????????: From data discovery and collection to reporting and governance, this eBook covers every stage of the security data lifecycle. ?? ?? ???????????????? ?????????? ?????? ???????? ????????????: After every chapter, assess your organization’s current capabilities and identify areas for improvement. ???? ????????-?????????? ???????????????? ?????? ?????? ??????????: Learn from our experts directly and see how the concepts outlined in this resource are applied in different industries. ???? ????????-????-???????? ???????????????????????? ?????? ?????????????????? ????????????: Gain actionable insights and guidance on how to implement, adapt, and optimize each component of your security data strategy. ?? ?? ?????????????????????????? ?????????????????????????? ???? ???????????????? ???????? ????????????????: Learn how this model can address the daily challenges you face, and how to build a strategy that works for you. A huge thank you to Justin Borland, Aqsa Taylor, Alan Czarnecki, Alex Gilelach, Ryan Moon, Matt Carothers, Paul Keim, Don Mallory, Greg Olmstead, Jon Oltsik to helping us get this done! ?? Comment #SecurityDataStrategy if you want to be a contributor or early reader in our next book ??
No email required: Get Our 115 Page Book on Data Strategy!
-
Gear up for the book launch on Monday!!!!! ??????
Principal Cloud Security Engineer, Security Unfiltered Podcast Host, Advisory Board Member, Doctoral Candidate, Adjunct Professor
Rethink Data Architecture: Challenges & Solutions Reimagine your data architecture with our expert guide! Learn to avoid common pitfalls, build flexible systems, and adapt your strategy whether you're starting fresh or modernizing existing infrastructure. Discover how to navigate the challenges of re-architecting and ensure your data systems align with industry best practices. #DataArchitecture #DataStrategy #DataTransformation #DigitalTransformation #CloudComputing #BigData #DataAnalytics #TechInnovation #ReArchitecting #ITStrategy
-
We do it in style ??
Spent the day at GPSEC in Boston with GuidePoint Security and Andréa Assara, connecting with security leaders and diving into the evolving challenges in cybersecurity. Huge thanks to GuidePoint for hosting such an amazing event! Incredible energy, great conversations, and a ton of valuable insights from the community. A few key takeaways: ?? Security teams are rethinking how they manage data — efficiency, automation, and reducing complexity are top of mind. ?? Organizations want more control and flexibility in their security operations — cost is a major driver. ?? Hands-on experience matters — teams want to see solutions in action to understand the real-world impact. Grateful to be part of this community and excited about what’s ahead!
-
-
Thank you for covering our upcoming book release MarTech Edge! We are so honored to see all the interest pouring in already! Mark ?? your ?? calendar ?? 24th! #SecurityDataStrategy https://lnkd.in/deh7MTgs