🙂

Migrating from Your SIEM to a New One

Many years ago, in 2011, I wrote this blog post on SIEM migration, called “How to Replace a SIEM?” I was a consultant at that time and I helped some organizations to ...
Be Suspicious: Living in a Post-Perimeter World

Be Suspicious: Living in a Post-Perimeter World

We must change the way we think about security as technology and the way people use it has changed - by Tim Brown, VP of Security, SolarWinds MSP ...

Four Ways CSPi Can Help Take Your SIEM Security Solution’s Effectiveness to the Next Level

Today, SIEM security solutions remain an important part of any company’s overall security stack. Yet there are still ways to improve your SIEM’s performance and overall value – thus increasing the effectiveness ...
gurucul security analytics with machine learning and risk scores

A Security Evolution: Taking Security Beyond SIEM with Gurucul Security Analytics

At RSA Conference 2019, Gurucul stood out among the many security analytics vendors on the show floor. If you came by the booth, you probably sat down for a short presentation exploring ...
gurucul security analytics with machine learning and risk scores

A Security Evolution: Taking Security Beyond SIEM with Gurucul Security Analytics

At RSA Conference 2019, Gurucul stood out among the many security analytics vendors on the show floor. If you came by the booth, you probably sat down for a short presentation exploring ...

Make No Mistake — Microsoft Is A Security Company Now

That’s not a bad start of the day, reading such a headline from a Forrester analyst. I am often asked, how far we are going to drive security within Microsoft. Well, I ...

[Quiz] How Should You Deploy Your SIEM?

| | SIEM
A Security Incident and Event Management (SIEM) tool ingests logs from your environment, correlates the data and can disseminate insights via alerting, visual dashboards or reports. SIEMs normalize data into a readable ...
Imperva Cloud WAF and Graylog, Part II: How to Collect and Ingest SIEM Logs

Imperva Cloud WAF and Graylog, Part II: How to Collect and Ingest SIEM Logs

This guide gives step-by-step guidance on how to collect and parse Imperva Cloud Web Application Firewall (WAF, formerly Incapsula) logs into the Graylog SIEM tool. Read Part I to learn how to ...
🙂

Psychoanalyzing Security Cloud Fears

Here is a funny one: why so many security professionals (and leaders) still hate the cloud? OK, OK, I get it, many of you want to respond to this with a WHAT ...
How to Deploy a Graylog SIEM Server in AWS and Integrate with Imperva Cloud WAF

How to Deploy a Graylog SIEM Server in AWS and Integrate with Imperva Cloud WAF

Security Information and Event Management (SIEM) products provide real-time analysis of security alerts generated by security solutions such as Imperva Cloud Web Application Firewall (WAF). Many organizations implement a SIEM solution to ...
Loading...