en flag +1 214 306 68 37

Information Security Blog

Traffic Pattern Analysis Inside Out
Information Security

Traffic Pattern Analysis Inside Out

A guide to the abilities and limitations of network traffic pattern analysis to detect APT and other security threats.
No Head in the Clouds! How Health Providers Can Avert Cloud Security Breaches
Information Security

No Head in the Clouds! How Health Providers Can Avert Cloud Security Breaches

Cloud data breaches is a major concern for healthcare security specialists. But there are ways to prevent them.
Beat Petya/NotPetya with QRadar® SIEM
Information Security

Beat Petya/NotPetya with QRadar® SIEM

Petya ransomware turned out to be deadlier than its predecessors were. Still, IBM Security is well prepared to mitigate the threat.
Magic Out-of-the-Box – Does It Apply to SIEM Solutions?
Information Security

Magic Out-of-the-Box – Does It Apply to SIEM Solutions?

Our information security consultants give you the checklist to decide whether to replace or just upcycle your out-of-the-box SIEM system
No Wanna – No Cry or the Ways to Prevent Ransomware Attacks
Information Security

No Wanna – No Cry or the Ways to Prevent Ransomware Attacks

There are ways to prevent or, at least, minimize the harm of WannaCry or suchlike attacks, as experts providing information security consulting say.
Detecting APT Activity with Network Traffic Analysis
Information Security

Detecting APT Activity with Network Traffic Analysis

APT protection has recently become a byword as thousands of organizations keep facing network intrusions. The article focuses on network traffic analysis as a major means to detect advanced persistent threats.
What Can Go Wrong with SIEM Correlation Rules?
Information Security

What Can Go Wrong with SIEM Correlation Rules?

Four issues with SIEM correlation rules may make your security system vulnerable to potential cyber threats. The following article describes them in detail.
Information Security Breaches? - Security Event Sources to Blame
Information Security

Information Security Breaches? - Security Event Sources to Blame

Sometimes, SIEM system is not a pillar of network security. Unless addressed timely, problems with event sources may put it at considerable risk.
How SIEM Helps to Reveal Ransomware in the Workplace, and Why Go For It
Information Security

How SIEM Helps to Reveal Ransomware in the Workplace, and Why Go For It

Ransomware is a burning issue for businesses. Here’s the guide to enable its detection with SIEM technology.
Chasing Spyware with a SIEM Solution to Pull the Plug on an APT
Information Security

Chasing Spyware with a SIEM Solution to Pull the Plug on an APT

A guide to why and how to detect spyware for taking on an APT in a corporate network with a SIEM system.
Hunting after Rogue System Administrators with a SIEM System
Information Security

Hunting after Rogue System Administrators with a SIEM System

Discover how a SIEM solution can help companies to withstand devastating insider attacks performed by malevolent system administrators.
Session Mapping to Facilitate User Identification with IBM QRadar SIEM
Information Security

Session Mapping to Facilitate User Identification with IBM QRadar SIEM

Learn about a quicker investigation of security events with QRadar Session Manager, a specialized tool that discovers user names and activities.