Vulnerability Scanning vs Penetration Tests

We always hear in the news about organisation’s around the globe are vulnerable to cyber-attacks. So, there is no better time to get yourself clued up about vulnerability scanning and penetration testing than now

Meet Log Analyser

Have you seen the online SIEM calculators used by some vendors? These calculators appear to give a view of log collection that indicates great visibility utilising little storage, however did you read the terms and conditions…

RETURN ON INVESTMENT OF A SIEM

They say if you can’t measure it, don’t do it. I like to quantify investments, money spent and what is my investment’s return? A SIEM…

SIEM Design – Filtering Windows Events

A SIEM solution accepts logs from a wide variety of log sources including network security appliances, Linux systems and often windows domain joined systems to name a few. SIEM solutions are designed to analyse these logs and look for patterns and or suspicious behaviour that may indicate a security incident that could impact your business. […]

SECURITY INFORMATION & EVENT MANAGEMENT DESIGN

Enhanced logging is taking detailed information about events happening on a system to determine if there are any suspicious events occurring such as Word downloading a file from the internet…