The Benefits of Migrating Your SIEM Solution to the Cloud
SIEM’s Role in Network Security Analysis and Monitoring Before we get started with our article discussing the benefits of migrating your SIEM, we want to lay the groundwork for the discussion
How Artificial Intelligence will Improve Cybersecurity
Since we are constantly being bombarded by the terms Artificial Intelligence and Machine Learning I decided to write this blog post with an AI tool. I absolutely had to give
How EDR Solutions are Bolstering Cybersecurity Defenses
Endpoint Detection and Response (EDR), also referred to as endpoint detection and threat response (EDTR), is an endpoint security solution that continuously monitors end-user devices to detect and respond to
Extended Detection and Response (XDR) is Changing SecOps
XDR emerged as a market category in response to the complexity of collecting, aggregating, analyzing, and investigating the thousands of alerts thrown off by dozens of security technologies. The basic
How to Defend Against Magecart Skimming Cyber Attacks
Defending Against Magecart Skimming Cyber Attacks Prior to the holidays last year and a couple of months before the outbreak of the Coronavirus pandemic we wrote about our concern with regard
Securing Your Remote Workforce
Protecting Your Remote Employees from Cyber Attacks As we suggested in our last blog post, this blog post was written to help our customers and readers of our blog protect themselves
Phishing and Wire Transfer Scams are Victimizing Corporate Executives
“CEO Fraud” or “CEO Fraud Phishing” Doubled Over the Past Year CEO Fraud is a scam in which cyber criminals either spoof or literally take over company email accounts to impersonate
Why and How DNS Hijacking is Increasing
The IDC Global DNS Threat Report released last summer revealed that 82% of organizations were victims of DNS attacks with each suffering an average of 9 DNS attacks which was
The Benefits of Using a SIEM to Improve IT Security
A SIEM’s Role in Network Security Analysis and Monitoring We put together a series of blog posts that deal with Network Security Design and Log Monitoring that are hopefully providing you
Why Log Monitoring and Management is Critical to IT Security
Why Log Monitoring and Management is Critical to IT Security In our last blog post titled “The Fundamentals of Network Security Analysis and Monitoring” we discussed active versus passive security devices,