security information and event management

Tag: security information and event management

Breach Data Trends: October 2019 to March 2020

Most of us have no idea if our credentials are out in the wild, for bad actors to take and use for malicious intent. Unfortunately, they often are. Since October…

Giving SIEM Tools a Role in Your IT Security Operations

While there is no one single solution to guard agencies against all cyberthreats, there are tools that can certainly go a long way toward managing and understanding the cyberthreat landscape.…

Logs, Logs, and More Logs: Why You Need SIEM and How to Make It More Effective

Four score and one post ago, we talked about Baltimore’s beleaguered IT department, which is in the throes of a ransomware-related recovery. Complicating the recovery mission is the fact that…

Neglect These Cybersecurity Fundamentals at Your Peril

“Shiny object syndrome” exists within both the IT and cybersecurity fields. The press loves to focus on the sleekest new security toys or the latest threat-hunting technique. After all, red-team/blue-team…

SolarWinds Lab Episode 74: Security Tools to Fit Today’s Threats

In this episode, Head Geeks™ Destiny Bertucci and Thomas LaRock will show you how to ward off security dangers using SolarWinds software. See how SQL injection can be rooted out and how…

7 Steps to Build an Effective Cyberincident Response Process

As an IT security professional, you work hard to prevent cyberattacks. You patch your systems regularly, update antivirus libraries, run user trainings, and lock down user access to sensitive systems…

Three SIEM Must-Haves

Many businesses need to increase their security game. You can put all the preventive measures in place that you want—like patching, antivirus, mail protection, and firewalls—yet threats can still slip…

You Are Here – A Reference Model for IT Infrastructure Security

We made it! This is the final post in this six-part series mapping the cybersecurity landscape through a new reference model for IT infrastructure security. Thank you for coming along…

You Are Here – Visibility & Control

Today, in the fifth post of this six-part series, we’re going to cover the fourth and final domain of our reference model for IT infrastructure security. Not only is this…

You Are Here – Identity & Access Security

Where are you? Halfway through this 6-part series exploring a new reference model for IT infrastructure security! As you learned in earlier posts, this model breaks the security infrastructure landscape…