Security Information and Event Management - Tagged - Security Boulevard
Si no podemos ver, no podemos proteger

Si no podemos ver, no podemos proteger

Hoy todas las organizaciones cuentan con al menos dos soluciones de seguridad informática, algunas de ellas siguen lineamientos de seguridad como “compliance” (ISO, SOX, PCI, etc) y otras no tanto; pero la ...
CTCI threat intel cybersecurity Linux

The Role of Technology in the Modern SOC

I’ve worked in security operation centers (SOCs) since before they were even called that, and I’ve seen a lot. A lot of threats, a lot of technologies that worked for a while—until ...
Security Boulevard

The Top Security Tools to Use Across the Cyber Kill Chain

The cyber kill chain, a military-inspired cybersecurity concept developed by Lockheed Martin, can be used to build a foundation for cybersecurity across your organization. The cyber kill chain essentially breaks down the ...
Avoid these Failures with SIEM Tools at All Costs

Avoid these Failures with SIEM Tools at All Costs

SIEM is a powerful security tool when deployed successfully. But, gathering insights and achieving the benefits of using a SIEM tool can be a challenge and many organizations fail to do so ...

[Webinar Replay] Opportunities in SIEM Analytics

Security information and event management (SIEM) is an approach to security management that combines SIM (security information management) and SEM (security event management) functions into one security management platform. SIEM tools aggregate ...

The Must-Have SIEM Features for Advanced Threats

Investing in a SIEM solution is an important step in protecting your organization from advanced threats. However, selecting a SIEM vendor can be a challenge unless you know what questions to ask ...