Slash Security Admin
Ploughing through log reports isn’t for the faint-hearted. It perhaps doesn’t improve the situation to know that the security information the report contains is already redundant. Or that the person reading the report may not fully understand what they are looking at. Unfortunately, we can’t avoid the reality that information security is built on information, …
Early Warning Systems Start with SIEM
Does Mystic Meg do threat predictions? No. And nor would we want her to. Russell Grant, Psychic Sally and Jonathan Cainer can’t help either. Predicting the attack vectors of malware threats is impossible – sure we can identify trends and known sources to limit exposure, but we have to accept that malware and security threats …
Love Your Logs
Are you still reading? Whilst it might not be the most stimulating of security tasks, Security Information and Event Management (SIEM) is a must have. SIEM feeds on logs and in the fight against ever increasing malware threats, we think it’s time we learned to love our logs.
Why Enterprise SIEM is like a trip to the gym
The approach that many organisations take towards Security Information Event Management (SIEM) also reflects the attitude of many towards physical fitness. Rather than go to the expense and inconvenience of setting up a home fitness studio; many “out-task” this and join a local gym.