Latest In

security information and event management

You Are Here – Perimeter Security
October 18, 2018
Chris Grundemann
In part 1 of this series, we covered some of the most prevalent and most promising cybersecurity models and frameworks available today. These are all tools that can help you…
Security Monitoring – It’s All About the Data
September 11, 2018
Natalie Timms
In this series, we’ve covered some key areas that can help prepare for potential attacks. Preparation is essential. Security policies are essential. Understanding your network and its assets is essential.…
Protection Methods – The Art of Data Analytics
August 28, 2018
Natalie Timms
The previous blog reviewed some guidelines that laid the foundation for security through understanding your environment and planning how elements within that environment are configured, used, accessed, and tracked. Although…
Culture of Data Protection: What Your Customers Expect
August 23, 2018
Karen Lopez
We’ve talked about building a culture, why it applies to all data environments, and some specific types of data protection features you should be considering.  Today, we’ll be considering the culture of protection the…
Policy and Controls – A Foundation for Threat Protection
August 14, 2018
Natalie Timms
In the previous blog in this series, we reviewed several types of attacks and threats, and some ways they are perpetrated. In this blog, we will become familiar with several…
Related Attributes: NetFlow and Interface Traffic Statistics
August 2, 2018
Nick Buraglio
For many engineers, operators, and information security professionals, traffic flow information is a key element to performing both daily and long-term strategic tasks. This data usually takes the form of NetFlow version…
Cybersecurity Fundamentals – Attack Surfaces and Vulnerabilities
July 31, 2018
Natalie Timms
In the first blog of this series, we became familiar with some well-used cybersecurity terminology. This blog will look at some well-known cyberattack and threat types and how they can…
Cybersecurity Fundamentals – Threat and Attack Terminology
July 18, 2018
Natalie Timms
In the first post of this blog series, we’ll cover the fundamentals of cybersecurity, and understanding basic terminology so you can feel comfortable “talking the talk.” Over the next few…
AI Should Not Replace Established Security Practices
June 18, 2018
Paul Parker
Here is an interesting article from my colleague Joe Kim, in which he discusses the impact of artificial intelligence on cybersecurity.   Agencies are turning to artificial intelligence (AI) and…
Log Analysis Tools Review: Syslog, Filtering the Most Relevant Events
June 15, 2018
Raff Poltronieri
Who’s passed more than a weekend going almost blind because something in your didn’t work as it should, and it produced, hopefully, thousands of lines of error messages, almost all…