Maintaining a Secure Environment: Monitoring Beyond the Log File
10/09/19 This blog series has been all about taking a big step back and reviewing your ecosystem. What do you need to achieve? What are the organization’s goals and mandates? What …
10/09/19 This blog series has been all about taking a big step back and reviewing your ecosystem. What do you need to achieve? What are the organization’s goals and mandates? What …
09/18/19 The first three blogs in this series were all about building a blueprint for a well-designed environment. In this article, we’ll review more practical considerations to in…
09/11/19 A security policy based on actual use cases has been documented, as have the components of the ecosystem. Before devising a practical implementation and configuration plan…
08/19/19 In the previous blog, we discussed how defining use cases mapped to important security and business- related objectives are the first step in building and maintaining a se…
08/12/19 Security is a key operational consideration for organizations today because a breach can lead to significant losses of revenue, reputation, and legal standing. An entity’s…
09/11/18 In this series, we’ve covered some key areas that can help prepare for potential attacks. Preparation is essential. Security policies are essential. Understanding your net…
08/28/18 The previous blog reviewed some guidelines that laid the foundation for security through understanding your environment and planning how elements within that environment a…
08/14/18 In the previous blog in this series, we reviewed several types of attacks and threats, and some ways they are perpetrated. In this blog, we will become familiar with sever…
07/31/18 In the first blog of this series, we became familiar with some well-used cybersecurity terminology. This blog will look at some well-known cyberattack and threat types and…
07/18/18 In the first post of this blog series, we’ll cover the fundamentals of cybersecurity, and understanding basic terminology so you can feel comfortable “talking the talk.” O…
03/09/18 In the final blog of this series, we’ll look at ways to integrate Windows event logs with other telemetry sources to provide a complete picture of a network environment. T…
02/22/18 Over the last three posts, we’ve looked at Microsoft event logging use cases and identified a set of must-have event IDs. Now we’re ready to put our security policy in pla…