It is fairly common knowledge among security professionals that security information and event management (SIEM) technologies are complex systems. No matter the vendor or the system, SIEMs require hard work and dedication to ensure they are running at their maximum capabilities and providing the most benefit to the organization.read more →
A new vulnerability in Microsoft Office has surfaced. The vulnerability is a memory corruption issue that resides in all versions of Microsoft...
Posted on November 15, 2017
Monitoring and detection is your primary line of defense. Firewalls, Next Gen X, IDS/IPS/HIDS and so on, are important components of defense, but monitoring and detection tie these all together. If you want to do the most you can to protect the keys of the kingdom, you need to have a solid program and plan put in place.read more →