Security Information & Event Management Blog | SIEM

The Crux of Cybercrime Event Logging... from a car alarm???

Five things you should be thinking about before someone tries to “break in” to your IT systems

It was 3:49 a.m. last Thursday. Car alarm was going nuts and my dog was wildly barking out on the.

Read more

Log Management Lesson: Confessions of a Security Systems Admin

“We thought we could handle all of the user’s problems without analyzing every single log message. Now I'm a news headline!”

Read more

5 Threats to Virtual Infrastructure Security and 6 Log Management Tips to Improve it

Virtualization is one of those computer terms that is often overused and misunderstood. Wikipedia defines it as “the creation of a virtual (rather than actual) version of something, such as an.

Read more

Locking Down your Files Systems? – 10 File Integrity Rules to Live By

We hear every day of different viruses and attacks almost as if they were coming off an assembly line. They come in all shapes, sizes and forms, and they are becoming more sophisticated and.

Read more

Utilizing Self-aware, Neural Network Technology for Threat Detection

The key to enabling actionable intelligence in your SIEM strategy is to have recurrent neural network capability to help manage events. Take this example for instance: If I react to an event, is.

Read more

Rounding out your SIEM Strategy with SNMP

MIB and SNMP traps have traditionally been used to track system health, performance and availability, but these network management tools are now finding their way into Information Security.

Read more

10 Guidelines to Ensure a 2011 Happy PCI DSS Holiday Season

With "Black Friday" fast approaching, I wanted to provide some guidelines for upholding the Payment Card Industry Data Security Standard (PCI DSS). The standard, managed by the PCI Security Standards.

Read more

6 Log Management Questions to Ask this Holiday Shopping Season

Recently, one of our customers reported that they are running upwards of 200 million messages per day through the CorreLog Enterprise Server – and this is just from the IBM z/OS mainframe!  The.

Read more

5 Security Policies to Help Counter Insider Threat

All of our customers have policies in place to counter insider threats. Some are better than others. Below is a quick and dirty list of five techniques that I have seen customers use to keep it.

Read more
1 2 3 4 5
Page 5 of 5