Blog Posts Tagged with "SIEM"

B8db824b8b275afb1f4160f03cd3f733

Wait, What? Someone Has to Look at Those Logs?

April 26, 2012 Added by:Jack Daniel

Monitoring the performance of your MSSP is cheap insurance- the last thing you want to face is a failure of your service and the need to rebuild an in-house program. You thought getting all that data pushed out to the MSSP was a pain- just imagine trying to get it back...

Comments  (1)

1de705dde1cf97450678321cd77853d9

A Tribute to Our Oldest and Dearest Friend - The Firewall

April 22, 2012 Added by:Ian Tibble

We have a lot of bleeding edge software and hardware products in security backed by fierce marketing engines which set unrealistic expectations. Out of all these products, the oldest carries the highest bang for our bucks - the firewall...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Protecting Your Enterprise by Breaking It

April 20, 2012 Added by:Rafal Los

In a nutshell, if you (in information security) haven't broken things in your organization's networks, you're likely terribly unprepared for when things to wrong and thus are doing it wrong. Now, before you come all unhinged, read the rest of this post...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Webinar: Reducing Visibility Costs with Unified Security Management

April 17, 2012 Added by:Infosec Island Admin

Webinar: Thursday, April 19, 2012 12:00 PM - 1:00 PM EST - Beyond improving your basic defenses, understand how unifying security management can maintain compliance and provide visibility into your infrastructure at a lower cost than traditional approaches...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Reducing the Cost of Visibility with Unified Security Management

April 09, 2012 Added by:Infosec Island Admin

Webinar: Thursday, April 19, 2012 12:00 PM - 1:00 PM EST - Beyond improving your basic defenses, understand how unifying security management can maintain compliance and provide visibility into your infrastructure at a lower cost than traditional approaches...

Comments  (0)

A966b1b38ca147f3e9a60890030926c9

LIGHTS Webinar: Cybersecurity Across Critical Infrastructures

April 08, 2012 Added by:Chris Blask

LIGHTS is a private-private non-profit partnership which provides a collaborative space to promote cybersecurity situational awareness across critical infrastructures. The goal of LIGHTS is to increase visibility into threats by making security monitoring ubiquitous...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Beyond the Firewall – Data Loss Prevention

April 05, 2012 Added by:Danny Lieberman

It doesn’t matter how they break into your network or servers – if attackers can’t take out your data, you’ve mitigated the threat. This paper reviews the taxonomies of advanced content flow monitoring that is used to audit activity and protect data inside the network...

Comments  (0)

83a1969531a4f021a9f7339e222ab995

New Release of COREvidence Multi-Engine Vulnerability Service at RSA Conference

March 29, 2012 Added by:Nabil Ouchn

This newest release comes with a bunch of new features and concepts. The dashboard has been designated to display clear and specific data for our users. At a glance customers can determine the assets with the least secure status. All relevant information is at your fingertips...

Comments  (0)

39728eff8ac87a48cfb050f0df29ceaa

IBM Got it Wrong: It’s Not about Adding Another Data Source

March 13, 2012 Added by:John Linkous

For the majority of organizations, information security is more post mortem than critical care. Regardless of how many billions you spend on security tools, until you fix this inherent problem in traditional SIEM tools, large organizations will continue to be breached...

Comments  (0)

A966b1b38ca147f3e9a60890030926c9

Shining LIGHTS on ICS Cybersecurity

March 11, 2012 Added by:Chris Blask

The LIGHTS program was created as a means of addressing security for the large number of small utilities operations. LIGHTS is a non-profit program run under Energysec that sets a consistent open-source-baseline approach to securing smaller critical industrial control facilities...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Redefining Security Intelligence with NOC and SOC

March 09, 2012 Added by:Rafal Los

Security dashboards are archaic, and often security teams have a half-dozen or more for visual confirmation on happenings. In well-run SOC organizations, a SEIM or new-school SIRM can provide context and close the real-time analysis gap, but this still isn't enough...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Dangers of Non-Contextual Pattern Matching

February 15, 2012 Added by:Rafal Los

Even a system inconsistency such as an abnormal page transition velocity on your flagship web application can be overlooked - until you put all those together and realize you're being SQL Injected and someone is stealing your multi-terabyte database out from under you...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

APT: What It Is and What It’s Not

February 10, 2012 Added by:Infosec Island Admin

They can use the most elegant of solutions and nimbly change their tactics, on the fly create/edit code to defeat the defender's tactics, and use the most simplistic of attacks in the effort to gain access KEEP it as long as possible to succeed in their own ends...

Comments  (0)

39728eff8ac87a48cfb050f0df29ceaa

Who Will Watch the Watchers?

February 05, 2012 Added by:John Linkous

We have entered a new era of cybersecurity, one where the objective is not to protect against a breach - the majority of large organizations are no longer able to - instead we need to be able to detect them and mitigate the damage done by them...

Comments  (0)

39728eff8ac87a48cfb050f0df29ceaa

Effective SIEM: Less Turtle - More Awareness

January 12, 2012 Added by:John Linkous

SIEM tools are highly focused on events. Even in cases where a SIEM can look outside of the world of events at one or two other pieces of data - say, at network traffic - that’s still woefully inadequate. We certainly need events and network traffic data...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Data Loss Prevention - Without the New Blinky Boxes

December 08, 2011 Added by:Rafal Los

The glut of blinking lights and devices that require time and effort to manage has gotten out of control... or so I'm being told. I've not manged a security team in 4 years now, but even back then the glut of boxes, products and solutions was becoming too much to bear. I can only imagine it now...

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »