
Meet Log Analyser
Have you seen the online SIEM calculators used by some vendors? These calculators appear to give a view of log collection that indicates great visibility utilising little storage, however did you read the terms and conditions…

DEFENCELOG – YOUR NEXT GENERATION SIEM
Our new YouTube channel is live. We will be posting content to show case innovative security technologies or our favourite hacking demonstrations.

RETURN ON INVESTMENT OF A SIEM
They say if you can’t measure it, don’t do it. I like to quantify investments, money spent and what is my investment’s return? A SIEM…

SIEM Design – Filtering Windows Events
A SIEM solution accepts logs from a wide variety of

SIEM DESIGN: CYBER KILL CHAINS, MITRE ATTACK AND SIEM
You may be wondering what on earth a Cyber Kill Chain is? After all, it sounds very a military term with little application in a business sphere, well I will connect the dots for you.

SECURITY INFORMATION & EVENT MANAGEMENT DESIGN
Enhanced logging is taking detailed information about events happening on a system to determine if there are any suspicious events occurring such as Word downloading a file from the internet…