DEFENCELOG – YOUR NEXT GENERATION SIEM

Our new YouTube channel is live. We will be posting content to show case innovative security technologies or our favourite hacking demonstrations.
RETURN ON INVESTMENT OF A SIEM

They say if you can’t measure it, don’t do it. I like to quantify investments, money spent and what is my investment’s return? A SIEM…
SIEM Design – Filtering Windows Events

A SIEM solution accepts logs from a wide variety of log sources including network security appliances, Linux systems and often windows domain joined systems to name a few. SIEM solutions are designed to analyse these logs and look for patterns and or suspicious behaviour that may indicate a security incident that could impact your business. […]
SIEM DESIGN: CYBER KILL CHAINS, MITRE ATTACK AND SIEM

You may be wondering what on earth a Cyber Kill Chain is? After all, it sounds very a military term with little application in a business sphere, well I will connect the dots for you.
SECURITY INFORMATION & EVENT MANAGEMENT DESIGN

Enhanced logging is taking detailed information about events happening on a system to determine if there are any suspicious events occurring such as Word downloading a file from the internet…