Compensatory Security Controls: The Alternative SolutionIn the modern-day threat landscape, organizations cannot sit back and wait for an attack to happen. They need to implement... BLOG Detective Security Controls December 4, 2020 Organizations implement technical, administrative, and physical controls to maintain an adequate level of security posture. The nature of these controls... Security Information and Event Management Series Part 4: Selecting a SIEM vendor November 9, 2020 In this last part of our series on SIEM, we will try to provide recommendations on selecting a SIEM vendor.... Security Information and Event Management Series Part 3: Main capabilities of SIEM November 2, 2020 In the first part of this four-part series, we covered the need for SIEM solutions and explained the fundamentals. Then,... Security Information and Event Management Series Part 2: Types of SIEM solutions October 26, 2020 In the first part of this four-part series, we covered the need for Security Information and Event Management (SIEM) solutions... Security Information and Event Management Series Part 1: Introduction To SIEM October 19, 2020 Cyber-attacks are consistently increasing, and as a result, so is the resulting damage. While attackers can target any organization as...
Compensatory Security Controls: The Alternative SolutionIn the modern-day threat landscape, organizations cannot sit back and wait for an attack to happen. They need to implement...
BLOG Detective Security Controls December 4, 2020 Organizations implement technical, administrative, and physical controls to maintain an adequate level of security posture. The nature of these controls... Security Information and Event Management Series Part 4: Selecting a SIEM vendor November 9, 2020 In this last part of our series on SIEM, we will try to provide recommendations on selecting a SIEM vendor.... Security Information and Event Management Series Part 3: Main capabilities of SIEM November 2, 2020 In the first part of this four-part series, we covered the need for SIEM solutions and explained the fundamentals. Then,... Security Information and Event Management Series Part 2: Types of SIEM solutions October 26, 2020 In the first part of this four-part series, we covered the need for Security Information and Event Management (SIEM) solutions... Security Information and Event Management Series Part 1: Introduction To SIEM October 19, 2020 Cyber-attacks are consistently increasing, and as a result, so is the resulting damage. While attackers can target any organization as...
Detective Security Controls December 4, 2020 Organizations implement technical, administrative, and physical controls to maintain an adequate level of security posture. The nature of these controls...
Security Information and Event Management Series Part 4: Selecting a SIEM vendor November 9, 2020 In this last part of our series on SIEM, we will try to provide recommendations on selecting a SIEM vendor....
Security Information and Event Management Series Part 3: Main capabilities of SIEM November 2, 2020 In the first part of this four-part series, we covered the need for SIEM solutions and explained the fundamentals. Then,...
Security Information and Event Management Series Part 2: Types of SIEM solutions October 26, 2020 In the first part of this four-part series, we covered the need for Security Information and Event Management (SIEM) solutions...
Security Information and Event Management Series Part 1: Introduction To SIEM October 19, 2020 Cyber-attacks are consistently increasing, and as a result, so is the resulting damage. While attackers can target any organization as...