Security Information & Event Management Blog | SIEM

Four Keys to Ensure your Mainframe is Included in your Enterprise and Security Compliance Strategy

Mainframe computers process some of the world’s most sensitive data. 96 of the top 100 global banks, nine out of 10 of the top global life and health insurance companies, and 355 of global Fortune.

Read more

The Big Iron ‘Ghost Town’: Are You Prepared for the Fast-Approaching Mainframe Security Labor Cliff?

Mainframes aren’t going anywhere soon, but competent mainframe professionals are disappearing at a rapid rate. The core systems of the world’s largest banks, insurers, and retailers are on.

Read more

Is Your Mainframe Security FISMA Compliant? If You Lack Real-Time Monitoring Capabilities, the Answer Is No.

The Federal Information Security Management Act (FISMA) added the weight of Federal fines to cyber security compliance in government operations, and for good reason ­– when compared to the cyber.

Read more

SC Magazine Five-Star Rating Comes at an Opportune Time for Organizations Seeking a Viable SIEM at a Reasonable Price

In May, CorreLog was pleased to announce a five-star rating from SC magazine on SIEM Correlation Server ver. 5.7.1 for its ease of use, performance, and value for money. Coincidentally, that same.

Read more

CorreLog Blog: Takeaways from SHARE Atlanta and Fuel for the CorreLog Product Roadmap

Another SHARE conference has come and gone, and we have much to report on where mainframe security is headed. Each year, SHARE demonstrates that the mainframe is not only here to stay, it’s.

Read more

InfoSec Firsts:  CorreLog and XBridge Combine to Unveil the Industry's First Data Loss Prevention (DLP) and Real-Time SIEM for z/OS at SHARE San Antonio

Information and innovation are the most valuable commodities in our increasingly digital world. Thanks to the IT revolution, we now enjoy virtually instant categorization and access to key enterprise.

Read more

Guest blog post, z/OS security, from Barry Schrager Part 3 of 7: Where's the data?

Mainframe Security: Part 3 - Where is all your sensitive data?

One vulnerability I see a lot are copies of sensitive data outside of the production environment. This sensitive data, if disclosed, can.

Read more

Guest blog post, z/OS security, from Barry Schrager Part 2 of 7: User Authentication

Mainframe Security Part 2: User Authentication

How can a system accurately determine whether access to data should be allowed when it is not certain who the user is? We have seen this in the NSA -.

Read more

Don’t expect to move your cyber-security gauge towards 'safe' until..

Your network is vulnerable because your log management practice fails to include real-time mainframe data.

The InfoSec World show is upon us. For those of you unfamiliar with InfoSec World, it is.

Read more

10 Step FIM Approach for Reliability, Data Security and Compliance

One area that you shouldn’t overlook that can derail your ability to hit IT service level agreements (SLAs) is file integrity monitoring (FIM). Your inability to uphold file integrity compromises.
Read more
1 2
Page 1 of 2