What Makes SOC Effective? People, Process, and Technology

In the evolving world of technology, cybersecurity threats are growing exponentially and, therefore, enterprises are seeking for standardized and automated Security Operation Centers (SOCs) to address these threats effectively. Though SOC standardization and Automation is of paramount importance, yet there are some other critical factors that must be considered when building an effective and reliable SOC.


Tune your SIEM to be GDPR Compliant – 5 Steps to Take

The most hyped law on data protection has finally come into effect on May 25, 2018. Passed by the European Parliament on April 14, 2016, it is already being touted as the most stringent data protection law across the world. Prior to GDPR, Data Protection Directive of 1995 was applicable which now stands repealed. Apart from the businesses incorporated in the European Union, GDPR also applies to businesses incorporate outside the European Union but are dealing with the data of EU residents.


Using Trend Analysis for Better Insights

Centralized log collection has become a necessity for many organizations. Much of the data we need to run our operations and secure our environments comes from the logs generated by our devices and applications. Centralizing these logs creates a large repository of data that we can query to enable various types of analysis. The most common types are conditional analysis and trend analysis. They both have their place, but trend analysis is perhaps the more often underutilized source of information.

Microservices, how do you maximize services levels by using ML

Vijay Tatkar, Director Product Management Oracle Management Cloud talks about microservices and how the development architectures are evolving from Monolithic towards microservices that give developers the freedom to adopt what work best for them. He particularly talks about how containers make microservices easier.

Container tips and tricks

Matt Helms, Risk & Safety Solutions @ UC Davis talks about container tips and tricks that DevOps community can use to better perform their function. He explains the difference between add vs. copy when building images, and provides best practices while using Docker and Kubernetes. He delivers numerous useful tips to optimize their use.

Log Management Comparison: ELK vs Graylog

Production logs can help ensure application security, reveal business insights and find and understand errors, crashes, and exceptions. But as useful as logs are, they’re difficult to manage and hard to keep track of. Making matters worse is that as log data volume grows, so does the difficult task of maintaining and managing them. It’s for this reason that developers, DevOps engineers, and CTOs turn to log management tools.