IT Security

Visit:

Train to be a SIEM scholar with our Log360 certification program

Starting April 25th, we’re hosting a free, four-part training program on security information and event management (SIEM). We’re excited to bring you this training for two reasons. First, we’ve updated this training to encompass new features—including event correlation, SQL autodiscovery, …

IT Security 2 min read

Connecting the logs with event correlation

Starting with the basics

Security information and event management (SIEM) helps with managing and analyzing the vast amount of log information generated by networks. Of all the capabilities of SIEM, event correlation is the most powerful. This technique analyzes log …

EventLogAnalyzer 2 min read

Reporting on and auditing your Office 365 environment

Migrating to Office 365 can seem like an immense task, but making the switch itself is just the tip of the iceberg. The real challenge with Office 365 is keeping tabs on everything. You might be wondering why you would …

IT Security 2 min read

Migrating HTTP to HTTPS: A top priority in 2018

Starting July 2018 with the release of Chrome browser version 68, Google Chrome will start marking all HTTP sites with a “Not secure” badge, even those that don’t deal with sensitive customer data. Google has been encouraging websites to move …

Key Manager Plus 2 min read

Expired SSL certificate shuts down Oculus headsets around the world 

Thousands upon thousands of affected Oculus Rifts was the last thing Oculus VR—a division of Facebook Inc. and developer of the Oculus Rift—wanted to wake up to. But after letting just one SSL certificate expire, this was their reality.

On …

Key Manager Plus 2 min read

GDPR prep steps—Part 1

Equip yourself for the GDPR.

The deadline for the General Data Protection Regulation (GDPR) is looming closer. Are you ready? In this two-part blog series, we’ll discuss the steps you can take to prepare for the GDPR before it takes full effect on May 25th.…

IT Security 2 min read

Talk to our experts about the essentials of log management

Log management is a pillar of security information and event management (SIEM), and is critical to any organization’s security strategy. Logs document every event that occurs on your network, and therefore have the power to inform you about various security …

EventLogAnalyzer 2 min read

Gold Lowell uses SamSam ransomware to terrorize SMBs

From late December 2017 to mid January 2018, several small and medium businesses found themselves the victims of SamSam ransomware, in attacks propagated by the Gold Lowell cybercrime gang. This campaign has made the group $350,000 richer.   

The Gold Lowell

IT Security 2 min read

A reminder to focus on securing your databases and web servers 

The trend of global cyberattacks has continued into February. In California, The Sacramento Bee recently experienced a ransomware attack on its databases, exposing the voter registration details of over 19 million voters. In another incident, a cryptojacking script—which is quickly …

IT Security 2 min read

How to prioritize your top security alerts for better SIEM

Receiving alerts when a critical event occurs is the first step in responding to a security incident. But as any security expert knows, analyzing log data can get chaotic when you have to sort through the massive volume of events …

IT Security 1 min read