SIEM What Next?By Ameya Sathye On 25 Sep 2017
Over past decade we have seen the evolution of SIEM from simple log management to Next Generation SIEM. During this evolution, OEM's have invented and used lots of buzz words like SIM, SIEM, SOC-in-the-box, NexGen SIEM, etc. Remember those days when...
Emerging Trends in Network SecurityBy Raghuram Gorur On 20 Jan 2016
‘We are building our lives around our wired and wireless networks. The question is, are we ready to work together to defend them?’,  asks the FBI in its cybercrime page. With 2015 showing an alarming increase not just in...
Staying Afloat During a Cyber-AttackBy Raghuram Gorur On 20 Jan 2016
Given the rising frequency of increasingly malicious and innovative cyber-attacks, one can safely conclude that cyber risk is here to stay. It is no longer a question of ‘if’ but ‘when’ your organization will have to deal with a cyber-attack....
How SIEM Systems can Improve the Detection of Events of InterestBy Vijay Bharti On 17 Aug 2015
Currently, enterprise awareness on cyber threats is high, and organizations are investing considerably in security solutions and the latest security tools. Nonetheless, the rising incidence of high-profile and successful attacks clearly demonstrate the need for more effective threat detection and...
Cyber Threat Intelligence – What is needed?By Haren Bhatt On 6 Apr 2015
Cyber Threat Intelligence (CTI) is a term used to address any kind of information that protects your organization's IT assets from potential security impeachment. CTI can take many forms. It could be internet based IP addresses or geo locations TTP's...
These blogs might interest you
by Tarun Vijay Bonthu on 21 Sep 2023
by Namrata Biradar on 8 Aug 2023
by Amit Kumar on 31 Jul 2023
by Kiran Chandran on 10 Jul 2023
Subscribe for blog updates