A SIEM solution has become an integral part of an organization’s security arsenal. But organizations often overlook the system’s capabilities, owing to a belief that SIEM functionalities are too complex and the architecture inscrutable. Regrettably, they neglect to meet the …

Security use cases: The key to test the readiness of your SIEM solution
Organizations have started considering cybersecurity as a top priority lately. The amount of money invested in IT infrastructure is increasing at an exponential rate. Further, dedicated teams are formed to monitor and optimize the performance of the different solutions that …
Data Privacy Day, Part 2: Overcoming challenges in securing customer information
In part 1 of this series, we discussed data privacy, the related laws, and the data collection practices that help comply with those laws. In this blog, we’ll take a look at the challenges in securing customer data and five …
Data Privacy Day, Part 1: What you need to know about data privacy
Data Privacy Day (known in Europe as Data Protection Day) is an international event aimed at raising awareness about data privacy and protection practices among businesses as well as internet users. In this blog series, we’ll attempt to do the …
Saudi Aramco data breach: A reminder to start monitoring RPIs
On June 23, 2021, threat actors reported that they had stolen a terabyte of data from Saudi Aramco, a state-owned oil company in Saudi Arabia.
The threat actors released samples of data they had procured after redacting critical information. They …

Watch out for tenants living off your land
The cyberworld has witnessed and defended against several forms of attacks. Some of the most common ones known to disrupt a network include credential stealing, malware installations, worms and viruses, and insider threats. In order to execute these attacks successfully, …

Security operations center, Part 2: Life of a SOC analyst
In the first part of this blog series, we saw a brief overview of what a security operations center (SOC) is and how it operates. In this part, we’ll take a look at the typical activities that SOC analysts carry …
Are you listening to your logs? Part 3: High disk usage
In the previous blog of this series, we saw how server crashes can be avoided by detecting low disk space in time using logs. In this blog, we’ll talk about another server metric, disk usage, and how it can be …