General | April 6, 2018Learn how to protect your environment from ransomware [Free webinar] Back by popular demand, the Everything you need to know about ransomware webinar will be...
Security Information and Event Management | February 28, 2018A reminder to focus on securing your databases and web servers The trend of global cyberattacks has continued into February. In California, The...
IT Security | February 16, 2018How to prioritize your top security alerts for better SIEM Receiving alerts when a critical event occurs is the first step in responding to a...
IT Security | February 14, 2018Breaches at OnePlus and National Stores reinforce the importance of PCI compliance January saw another round of significant credit card data breaches, one of which was the...
General | February 5, 2018Free webinar: Everything you need to know about ransomware 2017 saw plenty of ransomware attacks, and cyber security experts believe we'll see many...
General | January 5, 2018Free webinar: Top five critical alerts you need for IT security 2018 promises to be another big year for IT security, with experts predicting even more...
IT Security | December 4, 2017How SIEM can help with auditing and compliance Recent cyber breaches and tighter compliance regulations are pushing businesses to invest...
IT Security | September 16, 2017Taking stock of your security posture after the Equifax cyber breach Equifax, a leading credit bureau, was victim to a massive cyber breach a few months ago....
IT Security | July 12, 2017Log management and SIEM fundamentals: Searching through logs and responding to incidents Understanding what happened in a security incident and trying to analyze the root cause of...
IT Security | July 4, 2017Log management and SIEM fundamentals: Mitigating security threats In parts 1 and 2 of this blog series, we went over SIEM and its role in performing a...
IT Security | June 28, 2017Log management and SIEM fundamentals: Comprehensive log collection and auditing The first step in SIEM is collecting log data. Log data, as we saw in part 1, is what...
IT Security | June 22, 2017Log management and SIEM fundamentals: Getting started Cyber attacks and network breaches can bring even the largest organizations to their knees...