en flag +1 214 306 68 37

Information Security Blog

Traffic Pattern Analysis Inside Out
Information Security

Traffic Pattern Analysis Inside Out

A guide to the abilities and limitations of network traffic pattern analysis to detect APT and other security threats.
No Head in the Clouds! How Health Providers Can Avert Cloud Security Breaches
Information Security

No Head in the Clouds! How Health Providers Can Avert Cloud Security Breaches

Cloud data breaches is a major concern for healthcare security specialists. But there are ways to prevent them.
Beat Petya/NotPetya with QRadar® SIEM
Information Security

Beat Petya/NotPetya with QRadar® SIEM

Petya ransomware turned out to be deadlier than its predecessors were. Still, IBM Security is well prepared to mitigate the threat.
Magic Out-of-the-Box – Does It Apply to SIEM Solutions?
Information Security

Magic Out-of-the-Box – Does It Apply to SIEM Solutions?

Our information security consultants give you the checklist to decide whether to replace or just upcycle your out-of-the-box SIEM system
No Wanna – No Cry or the Ways to Prevent Ransomware Attacks
Information Security

No Wanna – No Cry or the Ways to Prevent Ransomware Attacks

There are ways to prevent or, at least, minimize the harm of WannaCry or suchlike attacks, as experts providing information security consulting say.
Detecting APT Activity with Network Traffic Analysis
Information Security

Detecting APT Activity with Network Traffic Analysis

APT protection has recently become a byword as thousands of organizations keep facing network intrusions. The article focuses on network traffic analysis as a major means to detect advanced persistent threats.
What Can Go Wrong with SIEM Correlation Rules?
Information Security

What Can Go Wrong with SIEM Correlation Rules?

Four issues with SIEM correlation rules may make your security system vulnerable to potential cyber threats. The following article describes them in detail.
Information Security Breaches? - Security Event Sources to Blame
Information Security

Information Security Breaches? - Security Event Sources to Blame

Sometimes, SIEM system is not a pillar of network security. Unless addressed timely, problems with event sources may put it at considerable risk.
How SIEM Helps to Reveal Ransomware in the Workplace, and Why Go For It
Information Security

How SIEM Helps to Reveal Ransomware in the Workplace, and Why Go For It

Ransomware is a burning issue for businesses. Here’s the guide to enable its detection with SIEM technology.