paykasa bozdurma
Home > Support > Blog
The Most Valuable Alert: A Security Analyst’s Perspective

The Most Valuable Alert: A Security Analyst’s Perspective

When setting up monitoring, many people look at the IT assets inside the organization and set up alerts to identify attackers coming after those precious resources. It’s certainly important to be alerted when, say, an unknown user is being added to a Domain Administrator group. It’s a serious threat that’s easy to detect and address.

Tuesday, May 08, 2018/Author: David Wynne, Cybersecurity Engineer/Number of views (214)/Comments (0)/
Categories: Security Services
Creating an Incident Response Plan that Works

Creating an Incident Response Plan that Works

In a previous post, we discussed how security analytics integrates multiple data streams and pulls log information into a centralized system. This enables you to correlate security events from system logs and security tools, analyze the data in context, and compare it with threat intelligence.

Friday, October 21, 2016/Author: Paul Truitt, CISO & VP, Cybersecurity/Number of views (1186)/Comments (0)/
Why Analytics and Threat Intelligence Are Critical to IT Security

Why Analytics and Threat Intelligence Are Critical to IT Security

In the previous post, we announced that Paul Truitt, Vice President of Cybersecurity and Chief Security Officer at SageNet, will join a panel of experts to discuss “Technical Tools for Data Protection” at this week’s NACS (National Association of Convenience Stores) Show in Atlanta. Part of Mr. Truitt’s presentation will focus on security logging and monitoring, and the importance of pulling all logs into a centralized system for correlation, review and alerting.

Tuesday, October 18, 2016/Author: Luis R. Colon, CISSP, Information Security Manager/Number of views (1258)/Comments (0)/
Categories: Security Services
Insider Threats: The Biggest Security Risk Organizations Face

Insider Threats: The Biggest Security Risk Organizations Face

It’s right to be concerned about the risk of a cyberattack launched by a shadowy hacker organization in Russia. However, the biggest threat to your computer systems and data could be sitting in a cubicle down the hall.
Wednesday, July 27, 2016/Author: Luis R. Colon, CISSP, Information Security Manager/Number of views (1362)/Comments (0)/
How to Use Managed SIEM to Boost Security and Compliance

How to Use Managed SIEM to Boost Security and Compliance

SIEM is a security management model that provides administrators with a single, holistic view of all security-related data. Records of security events are collected by agents from a variety of sources, including end-user devices, servers, networking devices and security tools.

Monday, February 08, 2016/Author: The SageNet Team/Number of views (1617)/Comments (0)/
Categories: Security Services
RSS
12