
Vulnerability Scanning vs Penetration Tests
We always hear in the news about organisation’s around the globe are vulnerable to cyber-attacks. So, there is no better time to get yourself clued up about vulnerability scanning and penetration testing than now

Meet Log Analyser
Have you seen the online SIEM calculators used by some vendors? These calculators appear to give a view of log collection that indicates great visibility utilising little storage, however did you read the terms and conditions…

DEFENCELOG – YOUR NEXT GENERATION SIEM
Our new YouTube channel is live. We will be posting content to show case innovative security technologies or our favourite hacking demonstrations.

RETURN ON INVESTMENT OF A SIEM
They say if you can’t measure it, don’t do it. I like to quantify investments, money spent and what is my investment’s return? A SIEM…

SIEM Design – Filtering Windows Events
A SIEM solution accepts logs from a wide variety of

SIEM DESIGN: CYBER KILL CHAINS, MITRE ATTACK AND SIEM
You may be wondering what on earth a Cyber Kill Chain is? After all, it sounds very a military term with little application in a business sphere, well I will connect the dots for you.