en flag +1 214 306 68 37

Information Security Blog

What Can Go Wrong with SIEM Correlation Rules?
Information Security

What Can Go Wrong with SIEM Correlation Rules?

Four issues with SIEM correlation rules may make your security system vulnerable to potential cyber threats. The following article describes them in detail.
Information Security Breaches? - Security Event Sources to Blame
Information Security

Information Security Breaches? - Security Event Sources to Blame

Sometimes, SIEM system is not a pillar of network security. Unless addressed timely, problems with event sources may put it at considerable risk.
How SIEM Helps to Reveal Ransomware in the Workplace, and Why Go For It
Information Security

How SIEM Helps to Reveal Ransomware in the Workplace, and Why Go For It

Ransomware is a burning issue for businesses. Here’s the guide to enable its detection with SIEM technology.
Chasing Spyware with a SIEM Solution to Pull the Plug on an APT
Information Security

Chasing Spyware with a SIEM Solution to Pull the Plug on an APT

A guide to why and how to detect spyware for taking on an APT in a corporate network with a SIEM system.
Hunting after Rogue System Administrators with a SIEM System
Information Security

Hunting after Rogue System Administrators with a SIEM System

Discover how a SIEM solution can help companies to withstand devastating insider attacks performed by malevolent system administrators.
Session Mapping to Facilitate User Identification with IBM QRadar SIEM
Information Security

Session Mapping to Facilitate User Identification with IBM QRadar SIEM

Learn about a quicker investigation of security events with QRadar Session Manager, a specialized tool that discovers user names and activities.