Omer on Security
Subscribe
Sign in
Home
Archive
About
Latest
Top
Discussions
Can Splunk Overcome Its Innovator's Dilemma?
The SIEM king's future depends on the answer.
Aug 22
•
Omer Singer
7
Share this post
Can Splunk Overcome Its Innovator's Dilemma?
www.omeronsecurity.com
Copy link
Facebook
Email
Note
Other
1
How to Jumpstart Your Collaboration with the Data Team
To make a longstanding impact, security leaders don't need to look further than the company's existing data analysts
Aug 1
•
Omer Singer
2
Share this post
How to Jumpstart Your Collaboration with the Data Team
www.omeronsecurity.com
Copy link
Facebook
Email
Note
Other
June 2024
The Inside Scoop on Insider Risk
Avoid Insider Risk Project Failure with Mencken’s Law of Threat Detection
Jun 27
•
Omer Singer
Share this post
The Inside Scoop on Insider Risk
www.omeronsecurity.com
Copy link
Facebook
Email
Note
Other
Help Stop SOAR Abuse
Risk and complexity are on the rise from use cases that automation was never intended to support
Jun 18
•
Omer Singer
5
Share this post
Help Stop SOAR Abuse
www.omeronsecurity.com
Copy link
Facebook
Email
Note
Other
May 2024
You've Never Seen Lock-In Like This Before
How cybersecurity platforms are raising switching costs and maximizing profits
May 31
•
Omer Singer
3
Share this post
You've Never Seen Lock-In Like This Before
www.omeronsecurity.com
Copy link
Facebook
Email
Note
Other
Survivor's Guide to SIEM in 2024
How an ownership mindset can help you navigate big changes in the SOC landscape
May 23
•
Omer Singer
1
Share this post
Survivor's Guide to SIEM in 2024
www.omeronsecurity.com
Copy link
Facebook
Email
Note
Other
Navigating a Market for Lemons
The case for testing SIEM threat detection performance
May 14
•
Omer Singer
4
Share this post
Navigating a Market for Lemons
www.omeronsecurity.com
Copy link
Facebook
Email
Note
Other
2
April 2024
Lacework’s AI Didn’t Work
Why the Lacework crash is a lesson on the limitations of AI in cybersecurity
Apr 23
•
Omer Singer
19
Share this post
Lacework’s AI Didn’t Work
www.omeronsecurity.com
Copy link
Facebook
Email
Note
Other
1
Busting Four Myths on Usage-Based Pricing for Security Operations
Why the best cost model for security data is measured by the second
Apr 15
•
Omer Singer
1
Share this post
Busting Four Myths on Usage-Based Pricing for Security Operations
www.omeronsecurity.com
Copy link
Facebook
Email
Note
Other
The Security Data Fabric Identity Crisis
Why success with decoupled data pipelines takes overcoming a people problem
Apr 4
•
Omer Singer
15
Share this post
The Security Data Fabric Identity Crisis
www.omeronsecurity.com
Copy link
Facebook
Email
Note
Other
March 2024
Stop Playing MITRE ATT&CK Bingo
How security leaders get ATT&CK wrong and what you can do about it
Mar 21
•
Omer Singer
6
Share this post
Stop Playing MITRE ATT&CK Bingo
www.omeronsecurity.com
Copy link
Facebook
Email
Note
Other
2
Behavior Analytics in Your Security Data Lake Just Got Way Easier
Snowflake's new machine learning functions bring ML to SOCs without data scientists
Mar 7
•
Omer Singer
3
Share this post
Behavior Analytics in Your Security Data Lake Just Got Way Easier
www.omeronsecurity.com
Copy link
Facebook
Email
Note
Other
Share
Copy link
Facebook
Email
Note
Other
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts