Latest In

security information and event management

Breach Data Trends: October 2019 to March 2020
May 6, 2020
Kathleen Walker
Most of us have no idea if our credentials are out in the wild, for bad actors to take and use for malicious intent. Unfortunately, they often are. Since October…
Giving SIEM Tools a Role in Your IT Security Operations
July 16, 2019
Jim Hansen
While there is no one single solution to guard agencies against all cyberthreats, there are tools that can certainly go a long way toward managing and understanding the cyberthreat landscape.…
Logs, Logs, and More Logs: Why You Need SIEM and How to Make It More Effective
July 1, 2019
Becky Elliott
Four score and one post ago, we talked about Baltimore’s beleaguered IT department, which is in the throes of a ransomware-related recovery. Complicating the recovery mission is the fact that…
SolarWinds Lab Episode 74: Security Tools to Fit Today’s Threats
March 15, 2019
orangemattersw
In this episode, Head Geeks™ Destiny Bertucci and Thomas LaRock will show you how to ward off security dangers using SolarWinds software. See how SQL injection can be rooted out and how…
7 Steps to Build an Effective Cyberincident Response Process
March 6, 2019
Jim Hansen
As an IT security professional, you work hard to prevent cyberattacks. You patch your systems regularly, update antivirus libraries, run user trainings, and lock down user access to sensitive systems…
Three SIEM Must-Haves
December 19, 2018
Jim Hansen
Many businesses need to increase their security game. You can put all the preventive measures in place that you want—like patching, antivirus, mail protection, and firewalls—yet threats can still slip…
You Are Here – A Reference Model for IT Infrastructure Security
December 7, 2018
Chris Grundemann
We made it! This is the final post in this six-part series mapping the cybersecurity landscape through a new reference model for IT infrastructure security. Thank you for coming along…
You Are Here – Visibility & Control
November 29, 2018
Chris Grundemann
Today, in the fifth post of this six-part series, we’re going to cover the fourth and final domain of our reference model for IT infrastructure security. Not only is this…
You Are Here – Identity & Access Security
November 8, 2018
Chris Grundemann
Where are you? Halfway through this 6-part series exploring a new reference model for IT infrastructure security! As you learned in earlier posts, this model breaks the security infrastructure landscape…
You Are Here – Endpoint & Application Security
November 1, 2018
Chris Grundemann
So far in this series we have reviewed a few popular and emerging models and frameworks. These tools are meant to help you make sense of where you are and how…
123