<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=694598870919452&amp;ev=PageView&amp;noscript=1">
Sep 13

4 Crucial Steps to Getting the Best Value out of Your SIEM

Maximize Your SIEM

It is fairly common knowledge among security professionals that security information and event management (SIEM) technologies are complex systems. No matter the vendor or the system, SIEMs require hard work and dedication to ensure they are running at their maximum capabilities and providing the most benefit to the organization.

read more →
Oct 05

Getting better at logs


read more →
Aug 24

Adaptive Monitoring

Monitoring and detection is your primary line of defense. Firewalls, Next Gen X, IDS/IPS/HIDS and so on, are important components of defense, but monitoring and detection tie these all together. If you want to do the most you can to protect the keys of the kingdom, you need to have a solid program and plan put in place.

read more →