Healthcare organizations are moving their business-critical applications and workloads to the cloud, and while there are many benefits (lower costs, added flexibility and greater scalability), there are also inherent risks
Today, many enterprises use security information and event management (SIEM) software to help detect suspicious activity on their networks. However, to be effective organizations need to surround a SIEM with
Targeted attacks are on the rise and often go undetected by traditional security solutions and methods. Endpoint Detection and Response (EDR) companies like CrowdStrike, Carbon Black, CounterTack, and a new
Ransomware is no joke; you’d be fooling yourself to think it’s not a problem that’s only increasing in use and severity. It continues to be a huge issue for companies
This year’s RSA Conference is expected to draw close to 50,000 security professionals to the Moscone Center in San Francisco. So we’re wondering, what issues are keeping them up at
There are 154 separate risks underlying the HIPAA compliance security standard. Addressing and continually monitoring each of these risks individually can be an enormous task for a security officer. SIEM
Imagine how much damage a hacker could do by compromising your Active Directory. Active Directory, which is used by an estimated 95% of Fortune 5000 companies, forms the core services
Today, January 28th, is Data Privacy Day. Data Privacy Day (DPD) is part of the #PrivacyAware campaign, which reminds businesses of the importance of data security within their organization. As
Interest in user and entity behavioral analytics, or UEBA as recently coined by Gartner, has risen dramatically over the past 12 months. And it’s for valid reasons. Attackers are using
Cybersecurity Awareness Month: A 3-Step Plan to Being Cyber Secure Step 1: Train your employees to be security savvy Some of the most basic, “expected” tools in security are often
In today’s demanding security environment, companies are more than ever challenged to identify serious threats before they lead to a data breach. Using a SIEM tool to correlate security events
SIEM systems were first created for large enterprises and government agencies that were frequent targets of advanced cyber attacks. Back then, smaller and lower-profile organizations were able to get by