US Cybersecurity Laws Overview And How SIEM Can Help

Cybersecurity is increasingly becoming a topic for legislators, especially for the public sector, critical infrastructure, healthcare, education, the financial and insurance sectors. In the US, in addition to several federal laws (HIPAA, HITECH, GLBA, SOX, FISMA, CISA), there are many state-level laws that impose some level of cybersecurity requirement (we have excluded the ones regarding election security in particular, as that’s a separate topic of discussion)


The Importance Of Threat Intelligence Sharing Through TAXII And STIX

Threat intelligence has been a very important asset to cybersecurity- knowing in advance some properties of malicious actors is key for preventing security incidents. Most typically these properties are IP addresses, domains, emails and file hashes, and being able to compare them to what’s happening in your infrastructure allows for quick response and prevention.

Ship Your ModSecurity Logs to Cloud SIEM

Now, you can ship ModSecurity logs to to automatically surface high-priority attacks identified by ModSecurity. will automatically parse those logs to project a greater bird’s-eye-view of your security situation within dedicated dashboards. ModSecurity is a prolific web application firewall (WAF) popularly used to help secure web servers. It supports Apache HTTP, IIS, and NGINX. It can deploy either as a proxy server or within a web server itself.


LogSentinel SIEM Roadmap: From SIEM to a 360-Degree Security Monitoring Platform

LogSentinel’s vision is to provide a security monitoring solution to any organization that needs it and thus reduce their risk of security breaches. That vision requires many innovations and here we’re sharing our high-level roadmap for the next 2 years. Each part of LogSentinel SIEM roadmap is accompanied with a detailed list of stories in our backlog so that can be easily brought to market.


How Clorox leverages Cloud SIEM across security operations, threat hunting, and IT Ops

During Sumo Logic’s Illuminate user conference, Heath Hendrickson, senior security architect at the Clorox company, and Gary Conner, senior threat protection lead, presented how they are leveraging Sumo Logic across security operations, threat hunting, IT operations, and more.


AlienVault vs QRadar

It's not uncommon for organizations to encounter hundreds of security incidents on a daily basis—from the trivial poking and prodding of script kiddies to nefarious activities that constitute the inner workings of advanced persistent threats (APTs). Transforming this volume of data into actionable information is impossible without the assistance of security intelligence, specifically, the analytic capabilities of security information and event management (SIEM) tools.


Top 7 Cybersecurity Threats to Watch Out For in 2021

2020 is coming to a close and technology has evolved rapidly to make way for changing market conditions. Cloud computing, Artificial Intelligence (AI), automation, and the Internet of Things (IoT) are evolving technologies that create unparalleled opportunities for companies to unlock new value. When technology advances, so does the landscape of cyber threats that companies have to navigate.


Key Benefits Of A SOAR Solution For MSSPS

An increasing number of organizations have partnered with Managed Security Service Providers due to the large range of threats facing organizations (MSSP). MSSPs support organizations efficiently by not only identifying external risks but also aiding them in the response to incidents. They also, however, battle a major problem: falling victim to the same shortcoming and bigger risks. They must ensure that consumers are met with Service Level Agreements (SLAs).


The 2020 Must-Know Security Breach Statistics

Security breaches are becoming increasingly commonplace and dangerous. The World Economic Forum nominated cyber-attacks as one of the major threats to global stability for 2019. Not only money is at stake, as breaches have an appalling effect on organizations’ reputation, trustworthiness, and often prove to a business killer. Most important, however, is the data – our personal data that once stolen is available to cybercriminals to exploit.