SIEM What Next?By Ameya Sathye On 25 Sep 2017
Over past decade we have seen the evolution of SIEM from simple log management to Next Generation SIEM. During this evolution, OEM's have invented and used lots of buzz words like SIM, SIEM, SOC-in-the-box, NexGen SIEM, etc. Remember those days when...
What is Happening in the Cyber Threat Landscape?By Jyothi Babu Thummala On 28 Sep 2016
Cyber-crimes are becoming increasingly sophisticated and ambitious in the current age of advanced persistent threats, zero- day attacks and advanced malware. Highly sophisticated threat actors are focused on stealing confidential information including intellectual property, PII, Credit card information, medical records,...
Security Operations Center – The Heart of Effective DetectionBy Karthik Palanisamy On 15 Sep 2016
Organizations around the world are facing cyber-attacks at regular frequency. Technology is evolving and so are safe guards, however, the threat perception is changing only for the worse. Even the latest security software and solutions have still not been able...
Creating and Maintaining a Security Operations Center (SOC)By Karthik Palanisamy On 15 Sep 2016
In recent times organizations have realized that IT security cannot be treated as a surrogate function and it has started to get the respect it deserves. IT security as a whole and IT Security Operation centers, in particular, are getting...
Adaptive SecurityBy Manikyala Rao On 1 Aug 2016
Network security is continuously under threat in today’s time. The threats are no longer from one source or do they belong to the same type, they have become very fluid in nature. The top network security challenges envisaged by the...
These blogs might interest you
by Mouna Ramesh on 28 Aug 2019
by Subramanya Ajjampur on 2 Aug 2019
Zero Trust Networks offer protection against many data breaches, but the way to them can be difficult
by Jyoti Bilgoji on 22 May 2019
by Viswanath Subramaniam on 29 Mar 2019
Subscribe for blog updates