Security Information & Event Management Blog | SIEM

CorreLog Blog: Takeaways from SHARE Atlanta and Fuel for the CorreLog Product Roadmap

Guest blog post, z/OS security, from Barry Schrager Part 7 of 7: Monitoring the Security of Your z/OS System

Guest blog post, z/OS security, from Barry Schrager Part 6 of 7: Is the network connected to your mainframe secure?

Guest blog post, z/OS security, from Barry Schrager Part 5 of 7: Monitoring Access to Sensitive Data

InfoSec Firsts:  CorreLog and XBridge Combine to Unveil the Industry's First Data Loss Prevention (DLP) and Real-Time SIEM for z/OS at SHARE San Antonio

Mainframe Myth-Busting: File Integrity Monitoring is only for Windows/UNIX security systems.

Guest blog post, z/OS security, from Barry Schrager Part 4 of 7: Who has access to your sensitive data?

PCI DSS Myth-Busting: When PCI DSS references File Integrity Monitoring, they are just talking about Windows/UNIX.

Guest blog post, z/OS security, from Barry Schrager Part 3 of 7: Where's the data?

Guest blog post, z/OS security, from Barry Schrager Part 2 of 7: User Authentication

Guest blog post, z/OS security, from Barry Schrager Part 1 of 7: System Integrity

8 PCI DSS Guidelines for Better Mainframe Compliance

Don’t expect to move your cyber-security gauge towards 'safe' until..

DAM that HACK! 7 ways your z/OS DB2 can alert you to cyber threat

Event Data vs. Syslog Data: 4 points of distinction for the CISO

10 Step FIM Approach for Reliability, Data Security and Compliance

Mainframe SIEM Log Management in a Distributed IT Security World

Log Management Language Barrier Pt. 3: Where to Find Mainframe Events

Log Management Language Barrier Pt. 2, Just what is Mainframe SYSLOG?

Log Management Language Barrier: Is it Syslog or SYSLOG?

FIM for Service Reliability, Security, Compliance and... Gamers!

The Crux of Cybercrime Event Logging... from a car alarm???

Log Management Lesson: Confessions of a Security Systems Admin

5 Threats to Virtual Infrastructure Security and 6 Log Management Tips to Improve it

Locking Down your Files Systems? – 10 File Integrity Rules to Live By

Utilizing Self-aware, Neural Network Technology for Threat Detection

Rounding out your SIEM Strategy with SNMP

10 Guidelines to Ensure a 2011 Happy PCI DSS Holiday Season

6 Log Management Questions to Ask this Holiday Shopping Season

5 Security Policies to Help Counter Insider Threat

Subscribe via Email

Connect with CorreLog