Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Security Incident and Event Management.

Detecting the undetectable: Building a fraud detection framework with Elastic

Learn how public sector organizations are using Elastic to identify fraudulent activity with rules and anomaly detection jobs fine-tuned for their specific use cases. Every organization faces the challenge of identifying and combating fraud. In the financial services industry, it might be credit card fraud; in the auto insurance space, staged accident fraud; and in the public sector, unemployment, health insurance, or tax fraud.

Log everything from anywhere: Centralizing log collection with Log360

In today's complex IT environments, comprehensive log collection is crucial for effective auditing and security monitoring. Without this, endpoints, especially those that are VPN-joined, stay out of your reach while auditing. This was the bottleneck faced by our Log360 customer who recently availed OnboardPro, ManageEngine's professional services. They knew Log360 was capable of collecting logs from all their network devices—but what about the endpoints that were connected remotely via VPN?

Why your security needs a modern SIEM solution

Not investing in a Security Incident and Event Management (SIEM) solution means you’re missing out on significant business benefits. A SIEM platform provides real-time detection and response to security incidents, helping you reduce the risk of costly compliance violations. Combine that with SIEM use cases such as consolidating and streamlining reporting, and your security team saves time and operational costs.

It's time for the defense and intelligence community to upgrade endpoint security

For more than 20 years, the US Intelligence Community (IC) and Department of Defense (DoD) have relied on a legacy Host Based Security System (HBSS) to provide basic endpoint security on critical networks. This solution has generally served its purpose by checking the box for endpoint security. However, most agencies still lack a truly integrated cross-operating system and cross-domain solution for endpoint detection and response (EDR).

Legacy vs. Cloud-native SIEM: Weighing the Pros and Cons

Choosing the right security information and event management (SIEM) solution is one of the most critical decisions you’ll make for your security program. As you evaluate your options, the central question is whether to stick with a traditional, on-premises SIEM or embrace a modern, cloud-native platform. This blog provides a direct comparison of the pros and cons of each, helping you make the best strategic decision for your organization’s needs.

Six Advanced Cloud-Native SIEM Use Cases

You already know that a security information and event management (SIEM) offers crucial benefits like scalability and reduced management overhead. But how do those platform advantages translate into stopping sophisticated threats? The answer lies in moving beyond simple log collection to leveraging powerful, behavior-based analytics.

Control logging costs on any SIEM or data lake using Packs with Observability Pipelines

Rising log volumes are making it harder than ever for security and SRE teams to balance visibility with cost. Every network, CDN, and security layer generates continuous streams of telemetry, but deciding what to parse, retain, or drop often requires manual configuration, specialized knowledge, and extensive tuning.

Embracing the Future of Security With Cloud-Native SIEM

As technology and cyberthreats continue to evolve, businesses must adapt their IT infrastructure and security strategies to stay ahead of the curve. At the heart of this evolution is security information and event management (SIEM). However, if you’re still relying on a traditional SIEM, you’re likely struggling to keep up.

Finding the Perfect Fit: Hosting Models for Cloud-Native SIEM Solutions

As you continue to embrace cloud-native security information and event management (SIEM) solutions, it’s important to understand the various hosting models available and select the one that best fits your organization’s unique needs. We’ll explore the pros and cons of different hosting models, including public cloud, private cloud, and hybrid cloud hosting. Your choice of hosting model plays an essential role in how your cloud-native SIEM solution is deployed, managed, and maintained.