What is Penetration Testing and Why do I need it?
Hacking through a company’s security protections used to require a lot of time and skill. However, today’s technological advances make it easier than ever for bad actors to find an organisation’s most vulnerable points…
Vulnerability Scanning vs Penetration Tests
We always hear in the news about organisation’s around the globe are vulnerable to cyber-attacks. So, there is no better time to get yourself clued up about vulnerability scanning and penetration testing than now
Meet Log Analyser
Have you seen the online SIEM calculators used by some vendors? These calculators appear to give a view of log collection that indicates great visibility utilising little storage, however did you read the terms and conditions…
DEFENCELOG – YOUR NEXT GENERATION SIEM
Our new YouTube channel is live. We will be posting content to show case innovative security technologies or our favourite hacking demonstrations.
RETURN ON INVESTMENT OF A SIEM
They say if you can’t measure it, don’t do it. I like to quantify investments, money spent and what is my investment’s return? A SIEM…
SIEM Design – Filtering Windows Events
A SIEM solution accepts logs from a wide variety of log sources including network security appliances, Linux systems and often windows domain joined systems to name a few. SIEM solutions are designed to analyse these logs and look for patterns and or suspicious behaviour that may indicate a security incident that could impact your business. […]
SIEM DESIGN: CYBER KILL CHAINS, MITRE ATTACK AND SIEM
You may be wondering what on earth a Cyber Kill Chain is? After all, it sounds very a military term with little application in a business sphere, well I will connect the dots for you.
SECURITY INFORMATION & EVENT MANAGEMENT DESIGN
Enhanced logging is taking detailed information about events happening on a system to determine if there are any suspicious events occurring such as Word downloading a file from the internet…