Security Information & Event Management Blog | SIEM

How realistic is the GDPR's 72-hr reporting rule, and how can you prepare for it?

The GDPR is now in effect. As the first data protection regulation enforceable by law, there is much uncertainty about how the European Union will enforce it. How strict will governing bodies be?.

Read more

A Cyber-Threat Assessment of the Mainframe: The Vulnerability is Real

Mainframe cyber breaches are a now a reality, see the recent Luxottica and Swedish Nordea Bank breaches as evidence. The myth that mainframes are unhackable is harmful, and today big iron is now.

Read more

Guest blog post, z/OS security, from Barry Schrager Part 7 of 7: Monitoring the Security of Your z/OS System

Every day, after you get your first cup of coffee, do you scan the mainframe security system violation and logging reports looking for abnormal behavior, strange activity, etc.?  Given the size of.

Read more

Guest blog post, z/OS security, from Barry Schrager Part 6 of 7: Is the network connected to your mainframe secure?

This segment of my series was authored by Peter Hager and Earl Rasmussen of Net’Q (www.net-q.com). I thank them for their input since the network connected to our mainframes must also be secured.

.

Read more

Guest blog post, z/OS security, from Barry Schrager Part 5 of 7: Monitoring Access to Sensitive Data

Now that you have eliminated all the z/OS system integrity vulnerabilities you could find, re-evaluated your user validation to minimize the possibility of credentials being stolen, found all your.

Read more

Guest blog post, z/OS security, from Barry Schrager Part 4 of 7: Who has access to your sensitive data?

Now that we’ve gone through verifying that your system has no known integrity vulnerabilities, users are validated in a manner that will minimize the chance of someone stealing their identity and.

Read more

Don’t expect to move your cyber-security gauge towards 'safe' until..

Your network is vulnerable because your log management practice fails to include real-time mainframe data.

The InfoSec World show is upon us. For those of you unfamiliar with InfoSec World, it is.

Read more

FIM for Service Reliability, Security, Compliance and... Gamers!

No, I'm not a gamer but...

I did read an article (Sony confirms external attack brough down PlayStation Network - Dean Takahashi, April 22, 2012) on GAMESBEAT this morning that talks about the.

Read more

6 Log Management Questions to Ask this Holiday Shopping Season

Recently, one of our customers reported that they are running upwards of 200 million messages per day through the CorreLog Enterprise Server – and this is just from the IBM z/OS mainframe!  The.

Read more
1
Page 1 of 1