Security Information & Event Management Blog | SIEM

A Cyber-Threat Assessment of the Mainframe: The Vulnerability is Real

Mainframe cyber breaches are a now a reality, see the recent Luxottica and Swedish Nordea Bank breaches as evidence. The myth that mainframes are unhackable is harmful, and today big iron is now.

Read more

InfoSec Firsts:  CorreLog and XBridge Combine to Unveil the Industry's First Data Loss Prevention (DLP) and Real-Time SIEM for z/OS at SHARE San Antonio

Information and innovation are the most valuable commodities in our increasingly digital world. Thanks to the IT revolution, we now enjoy virtually instant categorization and access to key enterprise.

Read more

10 Step FIM Approach for Reliability, Data Security and Compliance

One area that you shouldn’t overlook that can derail your ability to hit IT service level agreements (SLAs) is file integrity monitoring (FIM). Your inability to uphold file integrity compromises.
Read more

Mainframe SIEM Log Management in a Distributed IT Security World

Seems like every day we see news headlines about yet another cyber-breach. Government agencies, local municipalities, online gaming and social platforms, financial institutions, even high-school.

Read more

Log Management Language Barrier Pt. 3: Where to Find Mainframe Events

Over the last few weeks I have written that mainframe people and enterprise security people use “Syslog” to mean two different things and that z/OS SYSLOG is not a good source for the kinds of.

Read more

Log Management Language Barrier: Is it Syslog or SYSLOG?

Does your mainframe speak Syslog or SYSLOG?

Does your mainframe speak SIEM (security information and event management)? Do your mainframe people speak SIEM? If you are typical, your mainframe is.

Read more

FIM for Service Reliability, Security, Compliance and... Gamers!

No, I'm not a gamer but...

I did read an article (Sony confirms external attack brough down PlayStation Network - Dean Takahashi, April 22, 2012) on GAMESBEAT this morning that talks about the.

Read more

Log Management Lesson: Confessions of a Security Systems Admin

“We thought we could handle all of the user’s problems without analyzing every single log message. Now I'm a news headline!”

Read more

Locking Down your Files Systems? – 10 File Integrity Rules to Live By

We hear every day of different viruses and attacks almost as if they were coming off an assembly line. They come in all shapes, sizes and forms, and they are becoming more sophisticated and.

Read more

Utilizing Self-aware, Neural Network Technology for Threat Detection

The key to enabling actionable intelligence in your SIEM strategy is to have recurrent neural network capability to help manage events. Take this example for instance: If I react to an event, is.

Read more
1 2
Page 1 of 2