Security Information & Event Management Blog | SIEM

Guest blog post, z/OS security, from Barry Schrager Part 2 of 7: User Authentication

Mainframe Security Part 2: User Authentication

How can a system accurately determine whether access to data should be allowed when it is not certain who the user is? We have seen this in the NSA -.

Read more

DAM that HACK! 7 ways your z/OS DB2 can alert you to cyber threat

Database Activity Monitoring (DAM) is defined by Gartner as “… tools that can be used to support the ability to identify and report on fraudulent, illegal or other undesirable behavior, with.

Read more

Event Data vs. Syslog Data: 4 points of distinction for the CISO

It should come as no surprise that security information and event management, or SIEM, has been fueled by industry standards groups and government agencies. Leading the charge to how data and.

Read more

The Crux of Cybercrime Event Logging... from a car alarm???

Five things you should be thinking about before someone tries to “break in” to your IT systems

It was 3:49 a.m. last Thursday. Car alarm was going nuts and my dog was wildly barking out on the.

Read more
1
Page 1 of 1