IT Security | July 29, 2020Breach notification requirements of POPIA: The importance of SIEM A crucial aspect of the Protection of Personal Information Act (POPIA) is the notification...
IT Security | January 14, 2019The role of SIEM in PCI DSS compliance Studies have shown a direct correlation between data breaches and non-compliance. This isn...
IT Security | October 2, 2018Simplifying security auditing, part 6: Compliance and the cloud In part 5, we looked at auditing your network device logs. A decade ago, security...
IT Security | September 25, 2018Simplifying security auditing, part 5: Detecting network attacks Anyone trying to access resources in your network needs to interact with your network...
General | September 4, 2018Simplifying security auditing, Part 4: Securing web servers Web servers are front-end facing applications that are vital for the daily operations of...
IT Security | August 27, 2018Simplifying security auditing, Part 3: Keeping insider threats in check Insider threats are on the rise. In fact, both administrators and average employees are...
General | August 21, 2018Simplifying security auditing, Part 2: Auditing systems that store sensitive data In part 1, we looked at an overview of auditing servers. In this blog, we'll discuss which...
IT Security | August 15, 2018Simplifying security auditing, Part 1: Regularly reviewing server activity Everyone knows about the importance of log management in IT security. Yet, organizations...
IT Security | July 23, 2018Network breach at Australian National University serves as a reminder about the Notifiable Data Breaches scheme Earlier this month, several news outlets reported that Australian National University's ...
Security Information and Event Management | July 6, 2018Learn how to audit and secure your SQL and IIS servers Virtually every business today depends on databases and web servers for daily operations....
DataSecurity Plus | June 22, 2018Free webinar: Learn how to protect your enterprise from ransomware What's the first thing that comes to mind when you think about ransomware defense?...
IT Security | May 17, 2018Free webinar on setting up critical security alerts in your environment Every security team relies on security alerts as indicators of compromise (IOCs)....