Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SIEM

The latest News and Information on Security Incident and Event Management.

Defense Department's Multi-Cloud Cloud Strategy: A Role for SIEM

It’s difficult to recall a time over the last ten years when cloud requirements were not at the forefront of the Defense Department’s modernization efforts. Cloud capability reviews and requirements, in some form, extend from the Pentagon’s net-centricy efforts — to the Joint Information Environment, Digital Modernization, and up through to today.

CTO-Talk: Defense Artifacts for Zero-Trust Security

Based on blockchain technology, LogSentinel designs and implements a zero-trust security system that stores data on-chain, uploads local log files to the blockchain for storage, and provides a visual interface for users to use security analysis functions. The system can provide safe and reliable storage of security device logs and at the same time provide convenience for log analysis and log forensics. LogSentinel solves the problems associated with easy-to-delete, tamper, and falsifying log files.

Security use cases: The key to test the readiness of your SIEM solution

Organizations have started considering cybersecurity as a top priority lately. The amount of money invested in IT infrastructure is increasing at an exponential rate. Further, dedicated teams are formed to monitor and optimize the performance of the different solutions that each organization has in its environment. Similarly, when it comes to cybersecurity, it’s become essential to evaluate and quantify the security posture of every organization.

The secret is out: Why Open Security is key to preventing cyber threats

For decades, the cybersecurity industry has been shrouded in secrecy. This is partly because of the misunderstanding that cybersecurity often relies on obscurity as its primary form of defense. As the thinking goes, if adversaries don’t know about or understand the security controls that security vendors have in place, it will be easier to defend against cyberattacks.

The State of Security: SIEM in 2022

The world of enterprise cybersecurity is exceedingly dynamic. In a landscape that is ever-changing, security professionals need to combat a class of evolving threat actors by deploying increasingly sophisticated tools and techniques. Today with enterprises operating in an environment that is more challenging than ever, Security Information and Event Management (SIEM) platforms play an indispensable role.

Threat Intel - a Crucial Part of Cybersecurity

Threat detection is a key practice to information security. Identifying threats and detecting them on time helps to ensure enterprise security. If a threat is detected, then mitigation efforts must be enacted to properly neutralize the threat before it can exploit any vulnerabilities. Some of the most common threat detection processes are implemented through Extended Detection and Response (XDR) solutions and Security Information and Event Management

3 Cases of Hacked IoT Devices -- LogSentinel

internet of Things is a network of interconnected devices, software, sensors, or people that are provided with unique identifiers (UIDs), with the ability to transfer data over a network without the need for human interaction. Many #IoT devices remain unmonitored and improperly managed. These risks can become life-threatening when it involves the #healthcare sector. LogSentinel presents 3 notorious cases of hacked IoT devices and ways to keep your IoT devices safe. Monitoring threads and mitigating the risk for #cybersecurity in your organization is crucial.

I'm a former nation-state exploiter - here's why I know Open Security is our best defense

No single organization is prepared to stop an attack from a nation-state Not so long ago, I woke up every morning focused on one thing: finding and exploiting vulnerabilities. During my 10 years working for the U.S. National Security Agency (NSA), my single objective was to identify and exploit networks to collect foreign intelligence. I was fortunate to work alongside the world’s best professional vulnerability and exploit developers. My time serving my government was formative and humbling.

Graylog Security Anomaly Detection: Metrics Ease the Workload

Everything that makes employees’ lives easier, makes yours harder. Detecting insider threats — both employees and cybercriminals pretending to be employees — has never been more difficult or more important. The cloud technologies that make everyone else more efficient make security less efficient. They’re noisy. They send a lot of alerts. You’re tired. You’re overworked. You’re overloaded.

Why MSPs need to Reconsider SIEM for Office 365 Security

In 2005, a new market emerged when Gartner coined the term "SIEM" OR Security and Information Event Management. Back then, it was a legacy system aggregating event data produced by security devices, systems, network infrastructures and applications. However, it lacked monitoring functionality and was limited to vertical scalability.