11 Key Factors When Choosing a SIEM

Posted by on / 0 Comments

                     

Read more

SWAT Feed

Posted by on / 0 Comments

Hi, I’m Erin, the Cybersecurity expert. Today we are going to learn about threat intelligence feeds and why sometimes they are great and other times they can cause a lot of problems. A threat intelligence feed is a list of computer addresses of malicious individuals who have been known to attack companies and their systems....

Read more

StratoZen, Fortinet Security Fabric, and FortiSIEM

Posted by on / 0 Comments

The best fabric in the world must be custom tailored by an expert to achieve the perfect fit. The Fortinet Security Fabric is a groundbreaking approach to information security, and StratoZen is the custom tailor that makes the Security Fabric fit your business. FortiSIEM, as a critical component of the Fortinet Security Fabric, stitches together...

Read more

What is a SIEM

Posted by on / 0 Comments

Our cybersecurity expert, Erin, walks through what a Security Information and Event Management (SIEM) is. Hi, I’m Erin. If you’re not a cybersecurity expert, you may be wondering, “What is a SIEM anyway?” Well, I’m glad you asked! In this video, I’m going to explain what a SIEM is – and what it’s not –...

Read more

How Does a SIEM Work

Posted by on / 0 Comments

Our cybersecurity expert, Erin, walks through how a Security Information and Event Management (SIEM) works. SIEM stands for Security Information and Event Management. In other videos I’ve described how what every organization needs is timely, accurate security events notifying the right people as soon as possible. That is the purpose of a SIEM. But lets...

Read more

StratoZen’s Cybersecurity Monitoring and Compliance Solution

Posted by on / 0 Comments

Erin provides an overview of StratoZen’s comprehensive cybersecurity monitoring and compliance solution. Video Script: Hi. I’m Erin, the cybersecurity expert, and I’m going to give you an overview of our new comprehensive cybersecurity monitoring and compliance solution. Before we jump into our solution, let’s briefly talk about today’s cybersecurity challenges. In previous videos, I explained that...

Read more

Cybersecurity By The Numbers

Posted by on / 0 Comments

Our cybersecurity expert, Erin, walks through the typical costs of a data breach as well as the cost to build your own in-house SOC. Video Script: Hi. I’m Erin, the cybersecurity expert. Many of you have asked us how much you should worry about cybersecurity… specifically, how much a breach could cost you. So I’m...

Read more

Firewalls, IDS/IPS, and AV Aren’t Enough!

Posted by on / 0 Comments

Erin, our cybersecurity expert, explains why old school technologies like firewalls, intrusion detection and prevention systems, and anti-virus software can’t protect you from today’s malware threats. Video Script: Hi. I’m Erin, the Cybersecurity expert. In this lesson, I’m going to explain why old school technologies like firewalls, intrusion detection and prevention systems, and anti-virus software...

Read more

Are you just monitoring the front door while your house gets raided?

Posted by on / 0 Comments

The world of cybersecurity has had some fundamental shifts in the past few years that have made the vast majority of companies unprepared for today’s threats.  The proliferated use of malware for example has dramatically reduced the intrinsic value of traditional security solutions such as firewalls, IDS/IPS, and anti-virus software.  These solutions that use to...

Read more

Data Breaches Costs and Impacts

Posted by on / 0 Comments

The term “Go Big or Go Home” was first used by an exhaust system manufacturer in the ‘90s named Porker Pipes who primarily sold to Harley Davidson Motorcycles.  The term has been reused, rehashed, and repurposed over and over in the subsequent 20+ years by just about everyone. However, hackers have taken this motto to heart...

Read more