Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

IDS and SIEM

Due to the revolution of the internet, cyber-attacks on unsecured networks are increasing tremendously and organizations are on the verge of data breaches. Securing proprietary information, Personally Identifiable Information (PII), or any other sensitive data have become a daunting task. Preventing business disruption, information theft, and reputational loss is necessary to thrive and survive in the competitive industry.

What are Next SIEM Technologies?

An industry that is worth more than $2 billion, SIEM keeps growing and evolving. The first instances of SIEMs appeared as descendants of numerous security technologies: LSM, SIM, SLM/SEM, SEC and such. The earliest versions were so limited that they were barely able to scale across large companies and were rather slow. They also needed huge teams to manage thus raising the costs ever-higher. However, SIEMs have changed greatly since.

AT&T Cybersecurity Maintains Very Strong Ranking After Acquisition of AlienVault

The results are in, and once again AT&T’s Cybersecurity is recognized as an industry leader by securing its third consecutive ranking of “very strong” in Global Data’s annual product report. AT&T is the only company to achieve this hat-trick rating in all of Global Data’s seven categories of assessment. AT&T’s bold acquisition of AlienVault has reaffirmed its position as the cybersecurity leader with both competitive and qualitative edges.

What is Real-Time Threat Intelligence?

Would you sit back in your chair and do nothing while your systems are under attack? You may be, without even realizing it. Businesses are increasingly finding themselves under cyberattacks carried out by hackers or criminals. However, many of them fail to recognize that they have been attacked until it is too late to do anything. That is why timing is the most essential component of cyber security. Fighting attacks proactively instead of reactively can save your systems and networks.

What is Log Correlation?

Log data collection and management in IT have proved their importance in the past. Log collection and log correlation have become essential for security, internal control or compliance purposes. The average IT environment, though, consists of numerous components like software and hardware, and the logs can easily grow into hundreds of thousands in a blink of an eye. Logs contain essential pieces of network and device intelligence: What are user up to? What data is being viewed? By whom?

3 key takeaways on Cloud SIEM from Gartner Security & Risk Management Conference 2019

Gartner has been a thought leader in the SIEM space for the last few years. Gartner’s Magic Quadrant is considered one of the top market research reports on SIEM’s capabilities and vendors. Very recently, I attended the 2019 Gartner Security & Risk Management Conference, and based on thousands of conversations Gartner has had with their clients, they have a good vantage point on the SIEM space this year.

State of Cybersecurity Today

Today, the majority of our critical systems are intertwined with each other and are administrated by/through computers. Many decisions are automated and our lives are to some extent reliant on IoT connected devices. A great deal of our data is on cloud storage facilities and almost all of our personal data is stored in a device that has internet connection. The connectivity and complexity of these systems make them vulnerable. That is why cybersecurity has been gaining more and more importance.

10 Best SIEM Use Cases (Part 1)

Due to the sheer scale of challenges cybersecurity threats pose today, an enterprise-level security solution is always necessary for organizations. Is your company facing too many false positives? Are you spending too much time and budget on your corporate cybersecurity posture? Are you worried about vulnerable protocols and misconfigurations? Don’t worry!

Log Management Best Practices for SIEM

Undoubtedly, log management is the heart of any SIEM solution. The more access to logs your SIEM has the better it will be able to perform. Logs help in identifying who attacked your organization and how these malicious actors penetrate your corporate network. By logging all the vital information related to network devices and other critical systems, you will be able to get a deeper insight into your organization’s cybersecurity posture.

Industry Analysts Recognizing Cloud Analytics Brings Wave of Disruption to the SIEM Market

In the new report, “Analytics is making its security operations mark ahead of schedule,” analyst firm 451 Research details the accelerating transition happening in the security information and event management (SIEM) space. The report underscores how new cloud-native analytics solutions are displacing traditional SIEMs at the heart of the defense.