Security Information & Event Management Blog | SIEM

Guest blog post, z/OS security, from Barry Schrager Part 3 of 7: Where's the data?

Mainframe Security: Part 3 - Where is all your sensitive data?

One vulnerability I see a lot are copies of sensitive data outside of the production environment. This sensitive data, if disclosed, can.

Read more

DAM that HACK! 7 ways your z/OS DB2 can alert you to cyber threat

Database Activity Monitoring (DAM) is defined by Gartner as “… tools that can be used to support the ability to identify and report on fraudulent, illegal or other undesirable behavior, with.

Read more

Mainframe SIEM Log Management in a Distributed IT Security World

Seems like every day we see news headlines about yet another cyber-breach. Government agencies, local municipalities, online gaming and social platforms, financial institutions, even high-school.

Read more

5 Threats to Virtual Infrastructure Security and 6 Log Management Tips to Improve it

Virtualization is one of those computer terms that is often overused and misunderstood. Wikipedia defines it as “the creation of a virtual (rather than actual) version of something, such as an.

Read more

Utilizing Self-aware, Neural Network Technology for Threat Detection

The key to enabling actionable intelligence in your SIEM strategy is to have recurrent neural network capability to help manage events. Take this example for instance: If I react to an event, is.

Read more

Rounding out your SIEM Strategy with SNMP

MIB and SNMP traps have traditionally been used to track system health, performance and availability, but these network management tools are now finding their way into Information Security.

Read more

6 Log Management Questions to Ask this Holiday Shopping Season

Recently, one of our customers reported that they are running upwards of 200 million messages per day through the CorreLog Enterprise Server – and this is just from the IBM z/OS mainframe!  The.

Read more
1
Page 1 of 1