Skip to main content

October 05, 2016

Using Deception Systems to Augment SIEM

Many times, it can take large enterprises hundreds of days to detect security breaches. Worse yet, with in several recent instances, organizations hav...

See Details

October 15, 2015

Accessible Threat Intelligence

Threat intelligence is a term that has entered our vocabulary as security practitioners over the last couple of years. According to Gartner, threat in...

See Details

August 20, 2015

Four Thoughts for SIEM Success

Security information and event management (SIEM) is a unique security tool in its ability to rapidly identify threats to an organization. Automaticall...

See Details

October 07, 2014

Detecting Shellshock with SIEM Solutions

At the end of September, a serious vulnerability (CVE-2014-6271 and CVE-2014-7169) came to light affecting Linux/Unix and Apple OS X. The seriousness ...

See Details