Security Information & Event Management Blog | SIEM

Locking Down your Files Systems? – 10 File Integrity Rules to Live By

We hear every day of different viruses and attacks almost as if they were coming off an assembly line. They come in all shapes, sizes and forms, and they are becoming more sophisticated and.

Read more

Utilizing Self-aware, Neural Network Technology for Threat Detection

The key to enabling actionable intelligence in your SIEM strategy is to have recurrent neural network capability to help manage events. Take this example for instance: If I react to an event, is.

Read more

Rounding out your SIEM Strategy with SNMP

MIB and SNMP traps have traditionally been used to track system health, performance and availability, but these network management tools are now finding their way into Information Security.

Read more

10 Guidelines to Ensure a 2011 Happy PCI DSS Holiday Season

With "Black Friday" fast approaching, I wanted to provide some guidelines for upholding the Payment Card Industry Data Security Standard (PCI DSS). The standard, managed by the PCI Security Standards.

Read more

6 Log Management Questions to Ask this Holiday Shopping Season

Recently, one of our customers reported that they are running upwards of 200 million messages per day through the CorreLog Enterprise Server – and this is just from the IBM z/OS mainframe!  The.

Read more

5 Security Policies to Help Counter Insider Threat

All of our customers have policies in place to counter insider threats. Some are better than others. Below is a quick and dirty list of five techniques that I have seen customers use to keep it.

Read more
1 2 3 4 5
Page 5 of 5