A guide to onboard Security Information and Event Management in your Organization

If your business is like most, you are collecting logs from almost every device with security relevance. The flood of events is probably more than any human can alone correlate. This is the role of the Security Information & Event Management (SIEM) system.

When Protection Fails, Forensics can still win the game

The business is being disrupted by artificial intelligence (AI), security orchestration, and the Internet of Things. Many analysts also foresee an environment where computers and IoT devices replace robots for employees. Nevertheless, most futurists believe that technology will only grow to a virtual assistant’s level. Tasks will be split between artificial intelligence and human intelligence,…

Security on a Budget

Small- to medium-sized businesses (SMBs) face myriad challenges when it comes to information security. Yet, a couple of prevailing ones seem to drive all the others. First, many SMBs believe that their data is not as desirable or valuable as that of big businesses. And, second, they convince themselves that investing in adequate protection is…

Cyberattack

With the cyber world dominating our lives, cyberattacks represent a serious concern for organizations worldwide. Damage caused is not just limited to data (both personal and financial) but money, productivity and intellectual property as well. Global organizations worldwide will spend $101.6 billion annually on cyber security software, hardware and services by 2020 compared with spending…