Category: Cybersecurity incident management

May 3, 2022 | by Ritika Bramhe
SIEM tools

SIEM: Introduction to SIEM and 4 Top SIEM Tools

Security Information and Event Management (SIEM) technology has become a fundamental part of identifying and guarding against cyber attacks. It is one of the essential technologies powering the modern security operations center (SOC). SIEM is an umbrella term that includes multiple technologies, including log management, security log aggregation, event management, event correlation, behavioral analytics, and … Continued

read more
March 9, 2022 | by Christopher Gonzalez
Azure Sentinel

What Is Microsoft Azure Sentinel and Why Is It Important?

Microsoft Azure Sentinel is an intelligent, next-generation security information and event management (SIEM) solution designed to detect threat anomalies. Azure Sentinel is also categorized as a security orchestration automated response (SOAR) service that expedites the incident detection and event response process for cybersecurity teams. Azure Sentinel provides an extra layer of security to protect critical … Continued

read more
February 24, 2022 | by OnPage Corporation
endpoint detection

Can Endpoint Protection Keep up With Modern Threats?

Endpoint protection is a security approach that focuses on monitoring and securing endpoints, such as desktops, mobile devices, laptops, and tablets. It involves deploying security solutions on endpoints to monitor and protect these devices against cyber threats. The goal is to establish protection regardless of the endpoint’s location, inside or outside the network. In this … Continued

read more
September 8, 2021 | by OnPage Corporation
New Malware

10 Most Dangerous New Malware and Security Threats in 2021

Cyberthreats including malware, viruses, and other security hazards are constantly evolving and becoming more dangerous and harder to detect. This makes it quite difficult to keep your data and information protected nowadays. Unless you are sure that you are absolutely protected, which is wishful thinking, you remain at risk of attacks by the latest strains … Continued

read more
August 11, 2021 | by Christopher Gonzalez
Spending enough on cybersecurity

Are You Spending Enough on Cybersecurity?

Cybercriminals do not discriminate against the organization, people or industry they target. These actors look to exploit vulnerabilities in resources to intercept valuable data from small and medium-sized businesses (SMBs). Cyberattacks are inevitable, and organizations must have the right controls and information security systems to mitigate the impact of an attack. As cyberattacks continue to … Continued

read more
April 6, 2021 | by OnPage Corporation
shift left security

Shifting Security Left: Tools and Best Practices

What Is Shift Left Security? Software development pipelines typically cycle through key four processes—design, development, testing and software or update releases. Traditional pipelines perform quality and security tests only after completing the development phase.  Since there is no such thing as a perfect code, there are always issues to fix. However, if significant architectural changes … Continued

read more
April 2, 2021 | by Ritika Bramhe
SOC

Strategies to Reduce Alert Fatigue in Your SOC Team

In a SOC (security operations center), alerts originating from hundreds of systems compete to get attention. What ensues is a security analyst’s battle to beat alert fatigue while effectively defending their organization from cybersecurity threats.  Alert fatigue is a major challenge faced by security operations center (SOC) teams. The stakes are even higher since they … Continued

read more
December 21, 2020 | by OnPage Corporation
XDR

Will XDR Change Incident Response?

Extended Detection and Response (XDR) is a new security technology that promises to change the way security organizations operate, and introduce important efficiencies to day-to-day processes. In particular, XDR is expected to have a huge impact on incident response teams. In this article, we’ll explain the basics of XDR, show how it addresses incident response … Continued

read more
July 16, 2020 | by Sam Sharon
CASB

Tools to Manage Cyber Risk in a Growing Organization

Cyber Risk in a Growing Business Within the cyber security industry, it is well known that as a company grows, so does its attack surface. This trend lends itself largely to the fact that as more employees are hired, more company-owned machines (laptops, tablets, etc.) are distributed. The risk is that once a company-owned machine … Continued

read more

OnPage