Security Information & Event Management Blog | SIEM

Log Management Language Barrier Pt. 3: Where to Find Mainframe Events

Over the last few weeks I have written that mainframe people and enterprise security people use “Syslog” to mean two different things and that z/OS SYSLOG is not a good source for the kinds of.

Read more

Log Management Language Barrier Pt. 2, Just what is Mainframe SYSLOG?

Two weeks ago, I wrote that one obstacle to getting your Mainframe to “speak” to your security information and event management (SIEM) console was that mainframe people and enterprise security.

Read more

Log Management Language Barrier: Is it Syslog or SYSLOG?

Does your mainframe speak Syslog or SYSLOG?

Does your mainframe speak SIEM (security information and event management)? Do your mainframe people speak SIEM? If you are typical, your mainframe is.

Read more

FIM for Service Reliability, Security, Compliance and... Gamers!

No, I'm not a gamer but...

I did read an article (Sony confirms external attack brough down PlayStation Network - Dean Takahashi, April 22, 2012) on GAMESBEAT this morning that talks about the.

Read more

The Crux of Cybercrime Event Logging... from a car alarm???

Five things you should be thinking about before someone tries to “break in” to your IT systems

It was 3:49 a.m. last Thursday. Car alarm was going nuts and my dog was wildly barking out on the.

Read more

Log Management Lesson: Confessions of a Security Systems Admin

“We thought we could handle all of the user’s problems without analyzing every single log message. Now I'm a news headline!”

Read more

5 Threats to Virtual Infrastructure Security and 6 Log Management Tips to Improve it

Virtualization is one of those computer terms that is often overused and misunderstood. Wikipedia defines it as “the creation of a virtual (rather than actual) version of something, such as an.

Read more

Locking Down your Files Systems? – 10 File Integrity Rules to Live By

We hear every day of different viruses and attacks almost as if they were coming off an assembly line. They come in all shapes, sizes and forms, and they are becoming more sophisticated and.

Read more

Utilizing Self-aware, Neural Network Technology for Threat Detection

The key to enabling actionable intelligence in your SIEM strategy is to have recurrent neural network capability to help manage events. Take this example for instance: If I react to an event, is.

Read more

Rounding out your SIEM Strategy with SNMP

MIB and SNMP traps have traditionally been used to track system health, performance and availability, but these network management tools are now finding their way into Information Security.

Read more
1 2 3 4 5
Page 4 of 5