SIEM cybersecurity Red Menshen budgets semiconductor data, secure, conflict, oil security tools budget dark, web, threat

The 8 Must-Haves for the Next Generation of SIEM

A next-generation SIEM requires advanced security technologies, flexible deployment options, cost-effectiveness and transparent licensing ...
Security Boulevard

Log Ingestion 101: Which Logs Should You Be Bringing Into Your SIEM?

| | log management, SIEM
Security Information and Event Management (SIEM) tools are indispensable in an organization’s cybersecurity framework. SIEM tools collect, analyze, and correlate log data from various devices and applications across an organization to identify ...

CIS Control 08: Audit Log Management

Audit logs provide a rich source of data critical to preventing, detecting, understanding, and minimizing the impact of network or data compromise in a timely manner. Collection logs and regular review is ...

What Is Log Management, and Why Is It Important?

I think we all know what log management is. As discussed in a 2017 article for The State of Security, log management is about systematically orchestrating the system and network logs collected ...
Tripwire Products: Quick Reference Guide

Tripwire Products: Quick Reference Guide

The post Tripwire Products: Quick Reference Guide appeared first on The State of Security ...

Rooted in Security Basics: The Four Pillars of Cyber Hygiene

The term “cyber hygiene” pops up frequently in articles, blogs and discussions about cybersecurity. But what does it really mean? Some say it is an ill-defined set of practices for individuals to ...

Defending our Digital Homeland: Preventive Control Is Only The Beginning

Sir Winston Churchill spoke of fighting wherever and whenever to defend the homeland. The battle we face now in securing networks requires that same broad approach of defending and fighting everywhere we ...

Log Management for Government Agencies: What You Need to Know

Without a doubt, log management should be part of the core of any IT security platform of a government agency. It has a role in not only security but also in operations ...

What Is Passive Asset Discovery, and Is It That Important?

Let’s first talk about asset discovery in general and why it is useful, even critical, to most organisations. What Is Asset Discovery? Asset discovery is the ability to provide visibility of all ...

20 Critical Security Controls: Control 6 – Maintenance, Monitoring, and Analysis of Audit Logs

Today, I will be going over Control 6 from version 7 of the CIS top 20 Critical Security Controls – Maintenance, Monitoring, and Analysis of Audit Logs. I will go through the ...