Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SIEM

The latest News and Information on Security Incident and Event Management.

New SOC Performance Report: Security Analysts Are Overworked and Under Resourced

The fourth annual Devo SOC Performance ReportTM shows security professionals believe the SOC is significant to their organization’s cybersecurity strategy. As noted in our last blog, 77% of respondents say their SOC is “very important” or “essential” to their organization. But there’s pain behind the scenes as well. The report notes the majority of security professionals are feeling overwhelmed due to too much work and not enough resources.

Maturing Your Security Hygiene

Security hygiene is the process of reviewing your current cybersecurity posture and implementing security controls that mitigate data breach risks. As you mature your security hygiene, you create a centralized log management strategy that defines a path to a more robust posture. As part of this, you need to accommodate for the way threats evolve, including those unique to your specific industry or business.
Sponsored Post

Convince Your Boss You Need These Managed IT Security Services

Considering managed it security services? It is more important than ever to have a resilient security posture. Hackers are constantly looking for ways to exploit weaknesses in systems, and even a small data breach can have devastating consequences.

Elastic continues to gain momentum in SIEM market

Elastic has successfully delivered a leading Security Information and Event Management (SIEM) offering with only two years in the market. According to IDC Worldwide Security Information and Event Management Market Shares, 2021: The Cardinal SIEMs report, Elastic is one of the fastest growing SIEMs (more than 80% year-over-year growth) — and had the fifth largest market share in 2021 of the 20+ SIEM vendors in the report.

2022 Gartner Magic Quadrant for SIEM: Sumo Logic positioned as a Visionary for the second year in a row

Sumo Logic’s security team is thrilled to be named a Visionary in the 2022 Gartner® Magic Quadrant™ for Security Information and Event Management (SIEM) report. We are honored to be recognized for the second year in a row as a Visionary, which we feel reflects our Completeness of Vision and our Ability to Execute.
Sponsored Post

Monitoring Transaction Log Files for PCI compliance

File Integrity Monitoring, aka as FIM, is a must-have feature for anyone in charge of security. With FIM, one can detect when a critical file, such as a file that belongs to the Operating System, or a key configuration file, is changed. In most cases, configuring FIM is straightforward: If the file changes then generate an alert.