How SIEM can help with auditing and compliance

Recent cyber breaches and tighter compliance regulations are pushing businesses to invest more heavily in IT security. You and your organization may very well be in the process of assessing your...

IT Security 2 min read Read

Uber’s latest data breach drives home GDPR lessons

After a relatively quick rise, the entire Uber empire is at risk of falling apart. Uber has already been spending a lot of resources on public relations, legal challenges, as well as marketing exercises to sustain growth in the European Union...

IT Security 2 min read Read

Self-signed certificates: Wolves in sheeps’ clothing

Things often turn out great when you do them yourself. But when it comes to signing SSL certificates, you might want to give that DIY project a second thought. Before...

Key Manager Plus 3 min read Read

Taking stock of your security posture after the Equifax cyber breach

Equifax, a leading credit bureau, was victim to a massive cyber breach a few months ago. Given that the attack was one of the largest...

IT Security 3 min read Read

Begin your GDPR journey with privileged access management

The core of the GDPR is all about data protection; specifically, securing EU citizens’ personal data. However, the GDPR does not explicitly state how to achieve this level...

Password Manager Pro 3 min read Read

Getting to know the GDPR: The technical and organizational measures

Before we jump into the third part of this GDPR blog series, let’s take a moment to think about a few questions. Such as, why are compliance mandates necessary? Are they framed to just prevent data breaches? Are...

EventLogAnalyzer 2 min read Read

The GDPR: Requirements pertaining to data collection

Welcome to part two in a four part blog series about the European Union’s GDPR. In our previous blog, we discussed highlights and FAQ on the GDPR. Now, let’s...

IT Security 2 min read Read

Log management and SIEM fundamentals: Searching through logs and responding to incidents

Understanding what happened in a security incident and trying to analyze the root cause of an attack is like looking for a needle in a haystack....

IT Security 3 min read Read

Log management and SIEM fundamentals: Mitigating security threats 

In parts 1 and 2 of this blog series, we went over SIEM and its role in performing a thorough audit of your network. Now that we’ve got the basics...

IT Security 3 min read Read