Are you lowering your expectations to meet your SIEM performance?
It’s an old story. Admin meets SIEM. Admin falls in love with the demo provided by the SIEM vendor. Admin commits to a 3 year relationship with SIEM. And now the daily grind. The SIEM requires...
View ArticleCan general purpose tools work for IT security?
This post got me thinking about a recent conversation I had with the CISO of a financial company. He commented on how quickly his team was able to instantiate a big data project with open source tools....
View ArticleThree myths surrounding cybersecurity
A common dysfunction in many companies is the disconnect between the CISO, who views cybersecurity as an everyday priority, versus top management who may see it as a priority only when an intrusion is...
View ArticleAvoid Three Common Active Directory Security Pitfalls
While the threats have changed over the past decade, the way systems and networks are managed have not. We continue with the same operations and support paradigm, despite the fact that internal systems...
View ArticleYou’re in the Cybersecurity Fight No Matter What: Are You Prepared?
“You’re in the fight, whether you thought you were or not”, Gen. Mike Hayden, former Director of the CIA and NSA. It may appear at first to be a scare tactic or an attempt to sow fear, uncertainty, and...
View ArticleSIEM, UEBA, SOAR and Your Cybersecurity Arsenal
The evolution of Security Information and Event Management (SIEM) solutions has made a few key shifts over time. It started as simply collecting and storing logs, then morphed into correlating...
View ArticleWhat’s Next in 2018? Our Prediction: SIEM-as-a-Utility
The traditional enterprise network has seen a tectonic shift in recent years thanks to cloud, mobility and now IoT. Where once enterprise data was confined to the office network and data center, it’s...
View ArticlePrevention is Key in Cybersecurity
“You see, but you do not observe. The distinction is clear.” Sherlock Holmes said this to John Watson in “A Scandal in Bohemia.” Holmes was referring to the number of steps from the hall to the rooms...
View ArticleGoing Mining for Bitcoin
While you’ve been busy defending against ransomware, the bad guys have been scheming about new ways to steal from you. Let’s review a tactic seen in the news called bitcoin mining. Hackers broke into...
View ArticleCan you outsource the risk? Five questions to ask a managed SIEM or SOC vendor.
Given the acute shortage of security skills, managed solutions like SIEM-as-a-Service and SOC-as-a-Service such as SIEMphonic have become more widely adopted. It has proven to be an excellent way to...
View Article
More Pages to Explore .....