Plan Effective SIEM First, Compliance Second

Security information and event management (SIEM) is a major priority for large companies. It’s a reporting process that provides a holistic view of the health of an organization’s IT security as well as important details for various kinds of compliance regulations, including GLBA, PCI, FISMA, HIPAA, and more. But while SIEM helps your organization by … Continued

How to Detect Who Deleted a Group Policy Object

Group Policy Objects (GPOs) can provide configurations for access to shared resources and devices, enable critical functionalities or establish secure environments. If some of the GPOs are deleted, users may not be able to access the Internet, modify their data, use peripherals or even log in to their systems. Deleting GPOs that deal with access … Continued

How to Overcome SIEM Limitations

SIEM has a reputation as a helpful and must-have solution to improve security for any enterprise. However, Forrester experts say that SIEM has certain limitations, which makes it inefficient without additional investments in technology and personnel. Key SIEM Limitations SIEM has limitation of being good at analyzing the collected data. It provides huge amount of … Continued

Cryptolocker: When Antivirus Cannot Help

There is currently much talk about Cryptolocker and other kinds of ransomware. Cryptolocker is such kind of malicious program that, once it is active, starts encrypting files it can access on a local system or on network shares and then threatens to hold your data hostage until you pay. Users get this executable via spam … Continued

Infographics: Common Drawbacks of SIEM Solutions

SIEM is a complex solution that requires thorough maintenance and support, which often skyrockets SIEM expenses. The need to hire and train more SIEM analysts is named as the main factor that significantly influences the total cost of SIEM ownership. It earned the highest score (4.8) in the rating of expenses. In addition, 69% of … Continued

Top Five Hottest Trends at RSA 2016 Conference

The 25th 2016 RSA Conference, held in San Francisco, CA, has brought together the record number of attendees from all over the world to discuss major IT industry trends and upcoming challenges. For the past years, RSA Conference has been raising different hot topics, from unstructured data governance, IT auditing and network monitoring to threat … Continued

SysAdmin Magazine March 2016: Preparing for IT Auditors

Over the last few years, there has been a rise in the number of vulnerabilities that have been publicly announced.  Following compliance regulations is much more than a duty for stakeholders, it is inevitable component of the corporate security strategy. On the other hands passing compliance procedures is never an easy thing and demands much … Continued