There’s no doubt that today’s security information and event management (SIEM) solutions are powerful tools. Providing the best way to defend against dangerous cyber threats, a SIEM delivers a 360-degree view of an enterprise’s technical infrastructure looking at a collection of endpoints, network, firewall, and security events or ‘logs.’ SIEMs also correlate data from threat intelligence feeds, leveraging custom feeds and feeds like those from the global Open Threat Exchange® (OTX) community. The SIEM......
Each day, the cybersecurity landscape is expanding in complexity and the volume of threats generated. The emergence of mobile...Read More
IT compliance management is often a manual and tedious effort. It requires teams to monitor several IT security point...Read More
It used to be the case that perimeter security solutions were enough to keep the good guys in and...Read More
A Threat Intelligence Analyst on Vertek’s Cybersecurity team recently discovered a massive spam recipient list from a bad threat...Read More
Threat Summary On May 8th 2018 , Microsoft released critical security updates to patch a Remote Code Execution (RCE)...Read More
Threat Summary This blog is regarding a memory corruption vulnerability in the equation editor of Microsoft Office that affects...Read More