The Hacker News Logo
Subscribe to Newsletter

The Hacker News – Most Popular Cyber Security, Hacking News Site: SIEM

What is Threat Intelligence and How It Helps to Identify Security Threats

What is Threat Intelligence and How It Helps to Identify Security Threats

November 07, 2015Wang Wei
Simply put, threat intelligence is knowledge that helps you identify security threats and make informed decisions. Threat intelligence can h...
Here's How SIEM Can Protect Your Privileged Accounts in the Enterprise

Here's How SIEM Can Protect Your Privileged Accounts in the Enterprise

October 20, 2015Wang Wei
It’s inevitable. Most security threats eventually target privileged accounts. In every organization each user has different permissi...
Crowd-Sourced Threat Intelligence: AlienVault Open Threat Exchange™ (OTX)

Crowd-Sourced Threat Intelligence: AlienVault Open Threat Exchange™ (OTX)

July 14, 2014Swati Khandelwal
For years, the systems and networks that run our businesses have been secured by the efforts of IT and security practitioners acting on ...
SIEM for One, SIEM for All

SIEM for One, SIEM for All

July 07, 2014Wang Wei
IT security is not a luxury; it’s a necessity. While IT practitioners understand this and are on the lookout for effective security opti...
Vulnerability Management: Think Like an Attacker to Prioritize Risks

Vulnerability Management: Think Like an Attacker to Prioritize Risks

June 04, 2014Swati Khandelwal
Attackers care about ROI – they want to accomplish their objective with the least investment of time and resources possible. The same is...
Learn How SolarWinds Log & Event Manager (LEM) helps you to keep your Network Secure

Learn How SolarWinds Log & Event Manager (LEM) helps you to keep your Network Secure

March 15, 2014Swati Khandelwal
So, How do you currently monitor your logs and events, including network, servers, databases, applications, your router, firewall or Win...
AlienVault Unified Security Management: Real-Time Threat Detection Starting on Day 1

AlienVault Unified Security Management: Real-Time Threat Detection Starting on Day 1

March 14, 2014Swati Khandelwal
IT Infrastructure of organizations is growing ever more distributed, complex and difficult to manage. To manage such networks, a log man...
Importance of Logs and Log Management for IT Security

Importance of Logs and Log Management for IT Security

October 02, 2013Wang Wei
IT Security is the name of the game and no matter how big or small the size of your organization, you will always invest enough on sec...
What to Look For in a SIEM Solution

What to Look For in a SIEM Solution

July 25, 2013Mohit Kumar
Security Information & Event Management (SIEM) has evolved over the years to become one of the most trusted and reliable solutions ...
The Top Six Ways You Will Benefit From Event Log Monitoring

The Top Six Ways You Will Benefit From Event Log Monitoring

February 12, 2013Mohit Kumar
Systems on your network log data 24/7/365. Simply allowing logs to take up disk space, reviewing them only after something has happened and ...
Best Deals

Get Daily News Updates By Email

Join over 500,000 information security professionals — Get the best of our cyber security coverage delivered to your inbox every morning.