
How not to suck in SIEM implementation
This article will focus mainly on important considerations when it comes to SIEM implementation. It also exposes some oversights during the run phase.
This article will focus mainly on important considerations when it comes to SIEM implementation. It also exposes some oversights during the run phase.
Only a few minutes before the end of 2017, a heavy year on cybersecurity from huge breaches through ransomware spreading and new vulnerabilities disclosers, to new defense technologies loudly evolving all around. I feel however almost tactless when I look the other way around and try to depict all of this in the real-world projects […]
Equifax and Deloitte breaches detection took months! Why is it the case for big firms like Equifax & Deloitte? A SOC specialist analysis.
Indicators of Compromise (IOC) are items of forensic data (like information found in event logs or network flows), that highly indicate conceivably nasty activity in an organization’s system…
It has been 4 days now that OurMine claimed have been able to leak more than 3TB of corporate information’s from VEVO. As you probably already know, OurMine’s recent targets included also