In my previous post, we looked at how event correlation can be used to deal with advanced persistent threats (APTs). The thing is, an APT...
Conquer it with correlation—Part 1: The advanced persistent threat (APT)
Among all the pesky attacks that keep security administrators working late, advanced persistent threats (APTs) are possibly the most lethal. An APT is a long-term, targeted attack which involves stealthily spying on an organization’s...
Webinar: Learn a simple three-step approach to tackling threats
Technology has a lot to offer, from streamlining your business processes to protecting your network, but with all the advantages comes the risk of cyberthreats. Cybercriminals are always developing new...
Unravel security incidents using event correlation [Webinar]
Event correlation helps you wrap your head around the countless number of events going on in your organization. Our upcoming webinar, “Unraveling security incidents using event...
Webinar: Streamline incident management using SIEM
Organizations deal with several security incidents on a daily basis. Establishing accountability in resolving these incidents is a tough job. From detecting incidents to resolving them,...
Contest alert: Take part in the Log360 product pro challenge
We are delighted to announce our “Log360 product pro” challenge, a unique community contest. To participate, all you have to do is answer three simple questions over...
Brazil’s Banco Inter data breach shakes fintech industry
In what is perhaps the largest data breach in Brazil in recent times, a hacker group known as John Carter has stolen over 80,000 users’ personal...
Six things to consider before choosing a log management solution
Budgeting for IT has always been a problematic topic of discussion when planning an organization’s total budget. Organizations typically want to buy cutting-edge security solutions at the lowest cost possible. But we all know there...
Adopting a SIEM solution? Here’s what you need to know
Cyberattacks have become an everyday affair, especially with the WannaCry attack and EquiFax breach making headline news recently. You might be asking yourself why cyberattacks have become more...