Effective use of SIEM

How to Use SIEM Effectively?

In the last article, we talked about the top 5 SIEM reports and how you can generate them on the Logsign SIEM platform. We covered reports related to user accounts, file access, user/group changes, threats, and attacks. This article will show how you can effectively use the Logsign SIEM platform along the lines of the most popular use cases. A use case is defined as a series of actions or events between a system and a user that achieve a particular goal.

Continue reading

How to Ensure Security for Cloud Computing?

How to Ensure Security for Cloud Computing?

Although cloud computing has been extremely beneficial for tasks such as remote working and data storage, its security and privacy have become a daunting task and organizations and their customers have to suffer a massive loss when a data breach occursAlthough cloud computing has been extremely beneficial for tasks such as remote working and data storage, its security and privacy have become a daunting task and organizations and their customers have to suffer a massive loss when a data breach occurs.

According to the 2018 Cloud Security Report published by Cybersecurity Insiders, three cloud security challenges include threats data privacy (61%), protection against data loss and leakage (67%), and breaches of data confidentiality (53%).

Continue reading

Google+ Shutting Down: Is the Data Breach a Reason?

Alongside Facebook’s Cambridge Analytica incident, Google suffered a blow of its own. In March, a bug was found in the Google+ API that allowed third-party apps access to data of users who granted permissions to their profiles and also their friends. Evidently, Google did not disclose the finding of this bug and the subsequent data leak amid the growing concerns of data privacy across the globe and the scrutiny that Facebook was facing. Some reports also suggest that the leak was kept hush-hush due to the fear of drawing regulatory scrutiny and repetitional damage.[1]

Continue reading