Security Stretegies for SDX

2014 is the year when software defined networking (SDN) will emerge from the test lab and the megascale data centre and appear in enterprise networks. Major vendors such as Juniper Networks, Cisco Sys …
view article
  • Share

The Rise of the Security Specialist

Everybody needs a security specialist on the team – do you have yours? We talked in our last blog about why a technology-centric approach to security isn’t a long term solution for protecting asse …
view article
  • Share

Why Technology-centric Security Isn’t Sustainable

Short-term fixes are the norm for many companies’ information security, but they will know that there is a point on the horizon where this reactive approach will no longer be enough. Today’s organ …
view article
  • Share

Balancing Complexity and Simplicity in Cybersecurity

It won’t have escaped your notice that cybersecurity is becoming more complex by the second. Lots of converging factors are responsible - for one, modern cyber-attacks are changing daily as hackers …
view article
  • Share

Mapping the New Cybersecurity Landscape

The landscape of cyber security is always changing. Attackers are constantly probing for new weaknesses and vulnerabilities to exploit in corporate networks, while organisations are being forced to ta …
view article
  • Share

CSA/BSI: A Partnership with it’s head in the Cloud?

The Cloud Security Alliance (CSA) recently revealed some serious and potentially very damaging statistics about data security in the wake of the NSA’s PRISM scandal. A survey of its members highli …
view article
  • Share

15 Essential Things to Know About SIEM

Security information and event management (SIEM) should form the foundation of any organisation’s security strategy. With the ever-increasing threat of attacks and the inevitability of more sophisti …
view article
  • Share

Slash Security Admin

Ploughing through log reports isn’t for the faint-hearted. It perhaps doesn’t improve the situation to know that the security information the report contains is already redundant. Or that the pers …
view article
  • Share

Early Warning Systems Start with SIEM

Does Mystic Meg do threat predictions? No. And nor would we want her to. Russell Grant, Psychic Sally and Jonathan Cainer can’t help either. Predicting the attack vectors of malware threats is impos …
view article
  • Share

Love Your Logs

Are you still reading? Whilst it might not be the most stimulating of security tasks, Security Information and Event Management (SIEM) is a must have. SIEM feeds on logs and in the fight against ever …
view article
  • Share