The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.
Organizations both small and large that deal with personal data must be compliant with GDPR rules. At Coralogix, we’ve been working hard to be prepared for GDPR. Preparing your data for GDPR can be a daunting task, so we thought we’d shed some light on the issue.
The rather broad definition of personal data in the GDPR requires paying special attention to log data. GDPR and personal data in web server logs is a popular topic in many GDPR fora. For example, IP addresses or cookies might be considered personal data. Consequently, such data must be stored only with the consent of customers for a limited time. It is highly recommended to anonymize personal data before you hand over the logs to any 3rd party to minimize risk.
In my last post, I gave a high-level overview how to select a threat intelligence vendor and how to integrate indicators of compromise (IOCs) into your SIEM or log management environment. In this post, I will describe in detail how to use the Threat Intelligence plugin that ships with Graylog. I’ll start with the steps necessary to prepare your data, then explain how to activate the feature and how to configure it for use.
Just as news hits of two highly critical security vulnerabilities in Drupal – a popular open source CMS that powers 4.2% of known CMS websites – we have expanded our external Vulnerability Scanner yet again with Drupal specific security checks. We now offer peace of mind for anyone with a WordPress, Joomla!, SilverStripe or Drupal site, as well as checks for thousands of known software and configuration vulnerabilities for all major software products and operating systems.
Information. Data. Personal details. Particulars. Intelligence. Call it what you like—the universal truth is that in the present age, personal data has become one of the most valuable possessions. Companies around the world are scrambling to secure the data they have collected, while those with malicious intentions are vying for these coveted bits of information.
It’s official. Ransomware isn’t just one of the most common types of malware, it is the most prevalent malware used in cyberattacks according to the 2018 Verizon Data Breach Investigations Report (DBIR). This report found that of the data breaches involving malware in 2017, 39 percent made use of ransomware, which was twice the amount used the previous year.
We’ve added a new feature we think you’ll want to hear about—Single Sign-on. Uptrends is now compatible with Single Sign-on. Single Sign-on (SSO) is a great way to easily manage user accounts, improve productivity, and improve security, and now you can use SSO with Uptrends.
Security information and event management (SIEM) helps with managing and analyzing the vast amount of log information generated by networks. Of all the capabilities of SIEM, event correlation is the most powerful. This technique analyzes log data from your servers, applications, routers, firewalls, and other network devices, and identifies patterns of activity that indicate potential attacks.