What is an example of a cyber incident

What is a SIEM and Why Do I Need One?

What Does a SIEM Do? The dramatic increase in integrated technology over the past several decades has provided an operational boon; complex systems can be made to work together to help businesses and organizations do more, faster, and at lower costs. Yet, this efficiency exposes hidden threats. Each new integration – be it a custom …

What is a SIEM and Why Do I Need One? Read More »

12 Tips for Securing Your IT Infrastructure

The threats are real. And they’re not just limited to big companies or organizations either. Very often, attackers are using bots to troll the Internet for vulnerabilities. When the bot finds the vulnerability (or an employee engages with a malicious actor), then the attacker exploits that attack vector. So, how do you protect your organization …

12 Tips for Securing Your IT Infrastructure Read More »

What Does Mage.js Have to Do with Your Security?

Do you have an e-commerce website? If so, then you should know about one of the most recent hidden cyber threats from Russia: the mage.js extension. It’s new(ish), it’s nasty, and it infects your website in a nearly undetectable way and compromises your customers’ credit card information. A compromise that you, ultimately, will be liable …

What Does Mage.js Have to Do with Your Security? Read More »

Secure On The Cloud

Stay Secure On The Cloud: 3 Things You Need To Know

Cloud computing is an amazing advance in technology. Where before, whole servers would have to be dedicated on site to things like accounting software or email clients, now, much of those services are cloud-based, making it cheaper and easier to implement company-wide programs. But what about cloud data security? What does the cloud mean for …

Stay Secure On The Cloud: 3 Things You Need To Know Read More »

Why SIEM Matters In The Energy Industry

Cybersecurity For Energy & Utilities: Why It Matters

When we think of the targets of malevolent digital threats, we consider the financial sector. We think of identity theft. But do we consider the wild importance of energy cybersecurity? Let’s take a look at the energy and utility industry and talk about why security issues are so crucial, the most common problems in their …

Cybersecurity For Energy & Utilities: Why It Matters Read More »

SIEM, SOC, and YOU!

There are a lot of products and brands out there that like to talk about cybersecurity. SIEM. SOC. Antivirus. “Network Monitoring.” Some of these solutions are effective. Some are not. But here’s one thing they all have in common: implemented alone, without the appropriate knowledge and context of your organization’s security needs… they will ultimately …

SIEM, SOC, and YOU! Read More »

Security Operations Center

What Is A SOC (Security Operations Center)… and why does my company need one?

A comprehensive and mature security solution isn’t just about log monitoring, or having the right SIEM software running to detect threats. Automated systems are all well and good, but eventually you’ll want a pair of expert eyes on your environment to make sure that everything looks as it should. And for that, you’ll want a …

What Is A SOC (Security Operations Center)… and why does my company need one? Read More »

Are You Treated Like A Partner… Or Just A Ticket Number?

When considering how your managed SIEM service treats you as a customer, try this… imagine that you’re taking a college class. Scenario 1: you’re in a giant lecture hall. The students are crammed in, but you can find a seat toward the back. The professor is so far away you can’t make out much more …

Are You Treated Like A Partner… Or Just A Ticket Number? Read More »

How Mature Is Your Managed SIEM Service?

Here’s a little trick to help you determine whether your managed SIEM is a mature solution: ask your service provider what the ‘M’ in SIEM stands for. What you may not know is that ‘SIEM’ could be two separate acronyms entirely. There’s a “Security Incident Event Monitoring” service… and there’s a “Security Incident Event Management” …

How Mature Is Your Managed SIEM Service? Read More »

Scroll to Top