Where do your IT threats originate?

In 2012, the Ponemon Institute released its “Aftermath of a Data Breach Study”. Sponsored by Experian Data Breach Resolution, it examined what steps companies took to recover following a data breach associated with customer/consumer data. Its findings were comprised...

What are SIEM Services?

Frequently, SIEM (Security Information and Event Management) is introduced as a log archival tool. However, “Log Management” is only the starting point: any log management system is designed to collect and centrally store log data. Some vendors might provide cursory...