How the SolarWinds Attack Should Make You Rethink Your Third-Parties
How does the SolarWinds Attack alter how enterprises should rethink their third-parties in their IT environment? The story thus far: A hacking group …
How does the SolarWinds Attack alter how enterprises should rethink their third-parties in their IT environment? The story thus far: A hacking group …
What are the benefits of deploying a managed SIEM solution for your business security? How can it improve your SIEM performance, even to an optimal level? …
What is the role of SIEM today for businesses and workflows? This isn’t meant as an idle or a flippant question. Instead, it should provoke consideration of …
Today, we present new 2021 Cyber Predictions from Dr. Mike Lloyd, Chief Technology Officer of RedSeal. It’s hard to conceptualize, but we only just …
The Washington State Auditor Office disclosed suffering a data breach that exposed the personal information in 1.4 million employment claims. According to …
The editors at Solutions Review have compiled this list of the best cybersecurity certification courses on Udemy to consider if you’re looking to grow your …
Often, when we speak of onboarding in a cybersecurity context, we use an identity management lens. However, this isn’t the only lens we can or should use. In …
What is dwell time? Why does it matter for cybersecurity (or why does it keep cybersecurity professionals up at night)? How can a next-generation SIEM solution …
The editors of Solutions Review work to research SIEM on a constant basis. We compile technology research papers and reports, product updates, and capability …
What are the top data breaches of 2020? Finally, after one of the longest years in living memory, 2020 came to a close. We now stand in the first days of …