Security Information & Event Management Blog | SIEM

The GDPR Aftermath: Lack of Real-Time Security Alerts from Your Mainframe Could Cost Your Organization Unforeseen Millions

The GDPR is in full effect and the first disclosure of a major breach subject to the regulation has happened. The Ticketmaster breach which affected British and international customers compromised.

Read more

New Cost of a Data Breach Reveals Increasing Cost, Time to Discover, and Size of Data Breaches

Read more

Employees lack security and privacy training, and CISOs are worried, but is anyone doing anything about it?.

 The 2018 Ponemon Institute CISO survey of “What CISOs Worry About” debuted at the beginning of the year, and not surprisingly, cyber-risk and data breaches remain key concerns, with 67 percent of.

Read more

How realistic is the GDPR's 72-hr reporting rule, and how can you prepare for it?

The GDPR is now in effect. As the first data protection regulation enforceable by law, there is much uncertainty about how the European Union will enforce it. How strict will governing bodies be?.

Read more

A Cyber-Threat Assessment of the Mainframe: The Vulnerability is Real

Mainframe cyber breaches are a now a reality, see the recent Luxottica and Swedish Nordea Bank breaches as evidence. The myth that mainframes are unhackable is harmful, and today big iron is now.

Read more

Guest blog post, z/OS security, from Barry Schrager Part 7 of 7: Monitoring the Security of Your z/OS System

Every day, after you get your first cup of coffee, do you scan the mainframe security system violation and logging reports looking for abnormal behavior, strange activity, etc.?  Given the size of.

Read more

Guest blog post, z/OS security, from Barry Schrager Part 6 of 7: Is the network connected to your mainframe secure?

This segment of my series was authored by Peter Hager and Earl Rasmussen of Net’Q (www.net-q.com). I thank them for their input since the network connected to our mainframes must also be secured.

.

Read more

Guest blog post, z/OS security, from Barry Schrager Part 5 of 7: Monitoring Access to Sensitive Data

Now that you have eliminated all the z/OS system integrity vulnerabilities you could find, re-evaluated your user validation to minimize the possibility of credentials being stolen, found all your.

Read more

Guest blog post, z/OS security, from Barry Schrager Part 4 of 7: Who has access to your sensitive data?

Now that we’ve gone through verifying that your system has no known integrity vulnerabilities, users are validated in a manner that will minimize the chance of someone stealing their identity and.

Read more

Don’t expect to move your cyber-security gauge towards 'safe' until..

Your network is vulnerable because your log management practice fails to include real-time mainframe data.

The InfoSec World show is upon us. For those of you unfamiliar with InfoSec World, it is.

Read more
1 2
Page 1 of 2