Security Information & Event Management Blog | SIEM

PCI DSS Myth-Busting: When PCI DSS references File Integrity Monitoring, they are just talking about Windows/UNIX.

Not so fast…what about MFIM.

File Integrity Monitoring (FIM) has been part of the distributed landscape for years, generally as a component of an enterprise anti-malware strategy. But as attacks.

Read more

Guest blog post, z/OS security, from Barry Schrager Part 3 of 7: Where's the data?

Mainframe Security: Part 3 - Where is all your sensitive data?

One vulnerability I see a lot are copies of sensitive data outside of the production environment. This sensitive data, if disclosed, can.

Read more

Guest blog post, z/OS security, from Barry Schrager Part 2 of 7: User Authentication

Mainframe Security Part 2: User Authentication

How can a system accurately determine whether access to data should be allowed when it is not certain who the user is? We have seen this in the NSA -.

Read more

Guest blog post, z/OS security, from Barry Schrager Part 1 of 7: System Integrity

Mainframe Security Part 1: System Integrity

I’m often asked about what installations can do to maximize their data security in an IBM mainframe environment. For those that do not know me, I was.

Read more

8 PCI DSS Guidelines for Better Mainframe Compliance

/ 0 Comments / / by Tony Perri

What to do when your mainframe catches a virus

8 Guidelines for monitoring mainframe security controls per PCI DSS Requirements

Now that we have your attention, allow us to expound on the.

Read more

Don’t expect to move your cyber-security gauge towards 'safe' until..

Your network is vulnerable because your log management practice fails to include real-time mainframe data.

The InfoSec World show is upon us. For those of you unfamiliar with InfoSec World, it is.

Read more

DAM that HACK! 7 ways your z/OS DB2 can alert you to cyber threat

Database Activity Monitoring (DAM) is defined by Gartner as “… tools that can be used to support the ability to identify and report on fraudulent, illegal or other undesirable behavior, with.

Read more

Event Data vs. Syslog Data: 4 points of distinction for the CISO

It should come as no surprise that security information and event management, or SIEM, has been fueled by industry standards groups and government agencies. Leading the charge to how data and.

Read more

10 Step FIM Approach for Reliability, Data Security and Compliance

One area that you shouldn’t overlook that can derail your ability to hit IT service level agreements (SLAs) is file integrity monitoring (FIM). Your inability to uphold file integrity compromises.
Read more

Mainframe SIEM Log Management in a Distributed IT Security World

Seems like every day we see news headlines about yet another cyber-breach. Government agencies, local municipalities, online gaming and social platforms, financial institutions, even high-school.

Read more
1 2 3 4 5
Page 3 of 5