Cyber Risk Management Framework

Data is regarded as the most valuable asset in today’s business world. The examples of critical data include e-commerce data, e-banking data, and Personally Identifiable Information (PII). Therefore, data security is, and data breaches have become an international concern for individuals as well as organizations. The role of the Cybersecurity Risk Management Framework (RMF) in data security is indispensable. The RMF provides a structured, disciplined, and flexible process for managing the privacy and security risks that include information security categorization, control selection, assessment, and implementation, as well as system and control authorization and continuous monitoring.

Continue reading

What’s It About the Recent Facebook Hack That Affected 30 Million People?

The attacks have struck again and this time affecting millions. In yet another unprecedented hack against the internet giant Facebook, it was disclosed that at least 50 million users (later changed to 30) were directly affected by the newly identified source. It is being said that based on this attack, a hacker would be able to get into and take control of user accounts just as if it were them. In light of the requirements of the GDPR, Facebook was under a regulatory burden to report the breach, which it did in time. Details, however, were not released by the company pending investigation. Only the stipulation that data of users including their private messages could have been accessed was made public initially.

Continue reading

Emerging Technologies and Threat Trends in Cyberspace

There are a lot of definitions of cyberspace. Military agencies typically consider it the fifth domain after space, sea, air, and the land. However, there is a fundamental difference between these four domains and the cyberspace, which is that (unlike cyberspace) these four are geographical in nature. Whereas, cyberspace is a dynamic field. It does not hold any specific geographical area. We can say that cyberspace can be embedded in all other domains as it is transforming continuously. With its expansion, threat or attack surfaces are also expanding proportionally.

Continue reading

Ten Cool Things Your SIEM Should Do

A Security Information and Event Management (SIEM) is a security solution used
to identify, record, monitor, and analyze security events and incidents within a real-time IT environment. SIEM also centralize all the data. In addition, an effective SIEM solution must have certain capabilities to prevent colossal Data Breaches. The following sections delve into ten things that your SIEM solution should do.

#1 Simplicity

When looking for a SIEM solution, you must consider deployment simplicity which is one of the major factors of an effective SIEM. Therefore, the SIEM system should offer quick installation instead of triggering costly delays. Besides, it can be deployed on all physical, virtual, and cloud environments easily. Ready integration and easy-to-use are also vital considerations.

#2 Log Correlation: The Heart of SIEM

Since SIEM solution works with the principle of log collection and correlation, thereby it must perform log correlation effectively, in real-time, and provide centralized visibility into potentially non-compliant and insecure network activity. Doing so requires your SIEM to collect log from the entire IT infrastructure, including servers, workstations, security appliances, and network devices.

#3 Massive Scalability

Enterprise of any size and shape that especially depends on mission-critical networks needs to dilate requirements for additional users, sources, live and offline data backup, higher volume data indexing, and recovery and storage capabilities with the passage of time. Hence, your SIEM solution must provide a massive scalability to support these futures.

#4 High Availability

Your SIEM solution must ensure high availability by offering data backup capability, automatic failover, load balancing, services discovery, self-healing, a terabyte of live data capability, redundancy at any layer, and storage and backup capabilities both online and offline.

#5 Advanced Data Analytics and Dashboards

The SIEM solution should provide a simple and real-time security monitoring with its predefined and web-based widgets and dashboards. These dashboards should be easy to read, user-friendly, and allow drill down analysis. In addition, refreshing dashboards quickly should not have any negative outcome on the system performance. An effective SIEM can have hundreds of predefined dashboards and there should be maximum flexibility when creating new widgets and dashboards.

#6 Search and Forensic Investigation

Your SIEM system should help in finding out what you search within seconds, supply correct, relevant and actionable results, drill down research, ability to focus and filter, and ability to modify current queries or write new ones. Besides, it should help in to determine what was really happened previously, during, and after the event. Besides, it should also track log activities over time and in context of malicious events.

#7 Threat Detection

Detecting newly emerging threats on-premises, hybrid environments, and in the cloud is prerequisite for overall security endeavor of any organization irrespective of its shape and size. Therefore, your SIEM system must have an enhanced Threat Detection capability that empowers your security defense through early detection and automated response. Automated response feature mitigates the newly emerging security threats. Once the threat is detected with the automated active response, the SIEM should remediate it with pre-programmed corrective actions. Besides, threat detection offers several benefits such as stop wasting time and resources, eliminate and decrease false positives, and protect your corporate essential assets.

#8 Incident Response

It is imperative for any SIEM system to help in addressing and managing the aftermath of a cyber-attack or security breach. The main purpose of the incident approach is to minimize the damage, decrease recovery time and cost. Giving an effective incident response can also help in facilitating forensic investigations.

#9 Delegation

Flexible delegation capability is also an essential part of any efficient SIEM solution. It is indispensable when a business confidentiality needs to personalize and restrict user access. In fact, delegation assists IT managers to take the benefit of focused security monitoring on one side, save money and time for companies, and provide best governance practices to keep sensitive data confidential on the other.

#10 Compliance Requirements

Many organizations deploy SIEM solutions mere for compliance requirements because compliance mandates aren’t optional. For example, if your company accepts credit cards on internet transactions, you will certainly comply with the PCI data security standard because non-compliance can have grave repercussions for your company. Therefore, your SIEM must meet compliance requirements effectively and efficiently. In addition, it should respond to the non-compliant activity and policy violations with built-in correlation rules.


SIEM solution has paramount importance for any organizations’ security endeavor. SIEM system responds quickly to security incidents and events in order to mitigate the impact of such attacks and safeguard the organizations from the colossal damage of data breach. Presently, Facebook has borne the brunt of recent data breach and facing litigation at U.S courts. Therefore, effective and efficient SIEM systems can prevent notorious cyber-attacks such as Ransomware Attack as well as the reputational damage to the organizations.


Kumar, M. (2013, July Thursday ). What to Look For in a SIEM Solution. The Hacker News.

Logsign. (2018). Logsign: Security Information and Event Management. Logsign.