Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SIEM

The latest News and Information on Security Incident and Event Management.

5 Best Practices for Building a Cyber Incident Response Plan

You’ve probably heard the Boy Scout motto, “be prepared.” In his 1908 handbook, Scouting for Boys, the author explained, “it shows you how you must be prepared for what is possible, not only what is probable.” Your cyber incident response plan is how you prepare for a possible, and, also in today’s world, probable security incident or data breach. Unfortunately, since every organization is different, no single plan will work for everyone.

A modern SIEM for whole-of-state cybersecurity

US state and local government agencies continue to contend with a dizzyingly complex IT environment, which includes data silos, tool sprawl, rising cyber threats, and limited availability of cybersecurity experts. In response, many state CISOs are exploring a “whole-of-state” cybersecurity strategy, which aims to bolster their state’s security through centralization and collaboration.

CISOs and cybersecurity in an economic downturn: do more with less

The financial outlook for the rest of 2023 and 2024 is far from cheery, and economic uncertainty is affecting everyone and everything, including the cybersecurity sector. Security budget cuts or freezes are the course many organizations are tempted to take in this financially precarious situation. Conservative spending is a natural response to the present economic downturn and a possible recession knocking on our doors, implying fewer clients, lower profits, and higher costs.

The Future of Cybersecurity: Unleashing the Power of AI and Threat Intelligence

The rapidly evolving landscape of cybersecurity is witnessing the genesis of new paradigms, redefining the ways we perceive threat detection and response. Traditional approaches to cybersecurity are proving less effective against the sophistication of modern cyber threats. Among the many possible solutions, the integration of Threat Intelligence (TI) and Artificial Intelligence (AI) stands as an impressive contender, aiming to set a new standard in the industry.

Centralized Log Management for SOX Compliance

Over twenty years ago, a series of corporate financial scandals set off a chain reaction, culminating in criminal convictions and new legislation. After uncovering accounting fraud across public companies like Enron, WorldCom, and Tyco, the US Congress enacted the Sarbanes-Oxley Act of 2002 (SOX).

Leading the way in the Authentication and Identity category: AD360 wins the Fortress Award 2023

The Business Intelligence Group announced the winners of the Fortress Award 2023 on May 31. We are thrilled to share that ManageEngine AD360 stood out amongst the competition, earning recognition in the Authentication and Identity category. The Fortress Award is a prestigious accolade in the cybersecurity space, and it recognizes outstanding achievements and innovations in the fight against cyberthreats.

Elastic's detection rules are still open for business - plus further visibility to data quality

Given the increasing frequency, tempo, and sophistication of cyber attacks, it's more important than ever that organizations take a proactive approach to protecting their sensitive data and assets. One of the most critical elements of effective cybersecurity is openness. An open approach to cybersecurity means being transparent, sharing knowledge, and collaborating to build more robust defenses against threats.

RCA Series: Root Cause Analysis Overview

Root cause analysis plays an important role in web applications, IT operations, security, and industrial OT. This video series explains general approaches to root cause analysis and how Elastic accelerates the process with visualizations and dashboards, machine learning to detect anomalies and classify conditions, and interactive tools that empower analysts to drill into additional information that lead to root cause of potential system issues and security incidents.