Security Information and Event Management

Network Detection and Response (NDR) Done Right from the Ground Up
Filip Cerny | | Cybersecurity, data, IT, NDR, Network Detection and Response, Network Security, Security Information and Event Management, SIEM
With an NDR in place, your IT administrators can quickly detect anomalies on the network, from cyberattacks to malfunctioning application servers or network equipment ...
Security Boulevard
SOC 2 Compliance Provides AppViewX Customers Security and Data Protection Assurance
Prasanth Sundararajan | | certificate lifecycle management, PKI platform, Privacy Impact Assessment, Security Information and Event Management, SOC 2 Compliance, Software Development Lifecycle, Trust Services Criteria
At AppViewX, our top priority is safeguarding the digital identities that are the backbone of modern enterprises. With hundreds of customers and millions of certificates under management, AppViewX bears a significant responsibility ...

IBM to Bring AI to Cloud-Native SIEM Platform
Michael Vizard | | AI, Cloud-native, Cybersecurity, generative AI, IBM, Security Information and Event Management, SIEM, watsonx
IBM will add watsonx generative AI capabilities to its security information event management (SIEM) platform early next year ...
Security Boulevard

XDR vs. SIEM vs. SOAR: A Vendor-Agnostic Perspective
Shriram Sharma | | Analytics & Intelligence, and Response, Automation, cyber defense, Cybersecurity, Extended Detection and Response, Gartner, Security Information and Event Management, security orchestration, SIEM, SOAR, threat detection, threat response, XDR
For modern SOC teams, detection and response is a big data problem. Effective cyber defense hinges on collecting, analyzing, and acting on massive troves of security-relevant data. This is where tools like ...

The Role of Technology in the Modern SOC
Jason Mical | | Incident Response, Malware, Security Information and Event Management, Security Operations Center, SIEM, SOC, Vulnerability Management
I’ve worked in security operation centers (SOCs) since before they were even called that, and I’ve seen a lot. A lot of threats, a lot of technologies that worked for a while—until ...
Security Boulevard
The Top Security Tools to Use Across the Cyber Kill Chain
The cyber kill chain, a military-inspired cybersecurity concept developed by Lockheed Martin, can be used to build a foundation for cybersecurity across your organization. The cyber kill chain essentially breaks down the ...

Avoid these Failures with SIEM Tools at All Costs
Marc von Mandel | | cybersecurity monitoring, Security Information and Event Management, SIEM, SIEM tools
SIEM is a powerful security tool when deployed successfully. But, gathering insights and achieving the benefits of using a SIEM tool can be a challenge and many organizations fail to do so ...
[Webinar Replay] Opportunities in SIEM Analytics
Marc von Mandel | | network security monitoring, Security Information and Event Management, SIEM, SIEM tools
Security information and event management (SIEM) is an approach to security management that combines SIM (security information management) and SEM (security event management) functions into one security management platform. SIEM tools aggregate ...
The Must-Have SIEM Features for Advanced Threats
Marc von Mandel | | network security monitoring, Security Information and Event Management, SIEM, SIEM tools
Investing in a SIEM solution is an important step in protecting your organization from advanced threats. However, selecting a SIEM vendor can be a challenge unless you know what questions to ask ...