Solutions Review’s Top 15 SIEM Articles of 2020

Solutions Review's Top 15 SIEM Articles of 2020

The editors of Solutions Review work to research SIEM on a constant basis. We compile technology research papers and reports, product updates, and capability trends. Then, we compile it into best practices articles posted every week. Therefore, we tend to post a lot of SIEM articles through 2020 and beyond. Sorting through all of them could feel daunting to the IT decision-maker. Thus, we compiled some of our top SIEM articles and best practices released in 2020 to simplify the research process. 

The Top 15 SIEM Articles of 2020

The Essential 16 Incident Response Books for Professionals

Solutions Review compiles the essential 16 incident response books professionals need to add to their reading lists.

Incident Response matters now more than ever; even the most comprehensive cybersecurity platforms can’t prevent one hundred percent of all threats. Eventually, something will breakthrough, and you must be ready. We’ve listed the top sixteen incident response books professionals should add to their reading lists. These books are intended for beginners and experts alike and are written by authors with proficiency and/or recognition in the field of Incident Response.

Read the Article Here

Why You Need to Ditch Legacy SIEM (And Go to the Next-Generation)

Why does your business need to ditch your legacy SIEM solution and switch to a next-generation solution? 

When SIEM first became a recognized category (Gartner named the technology in 2006), it only captured the attention of large enterprises. From a purely technological perspective, this makes sense; one of SIEM’s key capabilities involves compliance. Almost all businesses must fulfill both governmental and industry compliance mandates concerning their cybersecurity. This requires filling in several critical reports…However, over time, smaller and smaller enterprises found SIEM could help them with another crucial challenge: threat detection. SIEM functions primarily through log management.

Read the Article Here

3 Ways to Mitigate False Positives in Your SIEM

What are three ways to mitigate false positives in your business’ SIEM?

Perhaps the greatest challenge to successful SIEM stems from false positives. As part of SIEM’s process, the solution collects and aggregates data from across the IT environment. Then, the solution normalizes the data to allow for easier threat analysis. If the solution detects a security event, it sends a security alert to your security team. 

On the surface, these alerts can foster speedy investigations and thus faster threat mitigation. However, SIEM on its own can struggle to distinguish between normal or non-suspicious activity and malicious activity. In these cases, the solution generates a false positive alert. 

Read the Article Here

The Top Remote Workforce Cybersecurity Capabilities (For Social Distancing and Everything After)

What are the top remote workforce cybersecurity capabilities, both for social distancing and for everything that comes after? How does on-premises cybersecurity differ from remote workforce cybersecurity?

According to technology research giant Gartner, 41 percent of employees may likely work remotely at least part-time even after the pandemic ends. After all, more employees working from home can help enterprises save in the long-run on operation costs. However, remote workforces also pose significant cybersecurity challenges, as many enterprises discovered in the wake of the coronavirus.

Read the Article Here

Solutions Review Presents Our SIEM Video Crash Course

Solutions Review presents our SIEM Video Crash Course, courtesy of the Solutions Review Explores and Solutions Review Defines series. 

It remains unclear how long the United States needs to stay socially distant; best estimates put the reopening date well past May 1. Therefore, most of us shall need to stay at home. However, working from home can offer plenty of opportunities for growth and improvement. In fact, this break in normal workflows allows cybersecurity professionals to catch up on their endpoint security skills. Alternatively, social distancing may offer your IT security team the time to gather resources and information for selecting a new identity management solution. 

Read the Article Here

The Best 24 SIEM Tools for Enterprises

Solutions Review’s listing of the top SIEM vendors is an annual mashup of products that best represent current market conditions, according to the crowd. Our editors selected the top SIEM products and tools based on each solution’s Authority Score, a meta-analysis of real user sentiment through the web’s most trusted business software review sites, and our own proprietary five-point inclusion criteria.

Read the Article Here

SOAR, Automation, and Enterprise Cybersecurity Use Cases

The rise of Security Orchestration, Automation, and Response (SOAR) security solutions pose a challenge to businesses of all sizes. Even as enterprises adopt them, the use-cases for these cybersecurity tools continue to develop. What, exactly, can SOAR actually offer organizations in practical terms? 

To answer these questions, the editors at Solutions Review decided to explore some of the major use cases of SOAR solutions. Today, we start with one of the most prominent letters in the SOAR acronym: “A” for automation. 

Read the Article Here.

The 9 Best LinkedIn SIEM Groups You Should Join

LinkedIn serves as one of the premier platforms for enterprise technology professionals to gather, share ideas, and connect. IT security professionals and decision-makers alike seeking insights from the smartest in the industry can find it at LinkedIn. 

Specifically, you can find these cybersecurity insights, especially for Security Information and Event Management (SIEM), in the LinkedIn Groups. LinkedIn professional groups allow experts in niche fields and branches to discuss their latest findings and share resources. In that spirit, the editors at Solutions Review present our list of the 9 best LinkedIn SIEM groups you should join. These are the most active forums on LinkedIn, and they regularly help us keep tabs on the industry.

Read the Article Here

The 8 Best SOAR Security Companies for 2020

Solutions Review’s listing of the top SOAR vendors is an annual mashup of products that best represent current market conditions, according to the crowd. Our editors selected the top SOAR products based on each solution’s Authority Score, a meta-analysis of real user sentiment through the web’s most trusted business software review sites, and our own proprietary five-point inclusion criteria.

Read the Article Here

The Key Lessons from the SolarWinds Orion Breach

What are the key lessons from the SolarWinds Orion Breach currently dominating cybersecurity conversations? 

We speak with no hyperbole when we say the SolarWinds Orion Breach might prove the definite cyber-attack of 2020. In fact, it may become the definitive breach since the Equifax hack in terms of impact and notoriety. But what exactly happened? And why does it matter to your cybersecurity posture in the coming year? 

Read the Article Here

Top 10 Udemy Cybersecurity Courses for Professionals

Solutions Review lists the top 10 cybersecurity courses you can take on Udemy right now that every security professional should consider taking.

Are you a security operations professional or cybersecurity engineer looking to gain new knowledge in networking or brush up your skills? Do you want to earn a cybersecurity certification but don’t know how to prepare yourself for the exams? Online courses offered through websites like Udemy allow cybersecurity professionals to practice their InfoSec knowledge and sharpen their skills through digital lectures and interactive guides.

Read the Article Here

What’s Changed: 2020 Gartner Magic Quadrant for SIEM

The editors at Solutions Review highlight what’s changed since the last iteration of Gartner’s Magic Quadrant for SIEM and provide analysis of the report.

Technology research giant Gartner, Inc. recently released the 2020 Gartner Magic Quadrant for SIEM. You can download it here. Gartner researchers define SIEM (Security Information and Event Management) as “customers’ need to analyze security event data in real-time, which supports the early detection of attacks and breaches. SIEM systems collect, store, investigate, support mitigation, and report on security data for incident response, forensics, and regulatory compliance.” 

Read the Article Here

Ten Top SIEM and SOC Video Courses for Professionals

Solutions Review lists the ten top SIEM and SOC video courses security professionals should consider.  

Are you a security operations professional or cybersecurity engineer looking to gain new knowledge in networking or brush up your skills? Do you want the latest on SIEM and security operations center (SOC) best practices? Online courses offered through websites like Udemy allow cybersecurity professionals to practice their InfoSec knowledge and sharpen their skills through digital lectures and interactive guides.

Read the Article Here

Top 6 Information Security Books for Professionals

Solutions Review compiles the 6 essential information security books professionals need to add to their reading lists.

Information security should form a critical component of enterprise workflows and considerations. Without information security, your enterprise is at the mercy of hackers (who have little mercy to spare). We’ve listed the top six information security books professionals should add to their reading lists. These books are intended for beginners and experts alike and are written by authors with proficiency and/or recognition in the field of Information Security.

Read the Article Here

Is It Too Early to Think about Business SIEM in 2021?

Is it too early to think about business SIEM in 2021?

2020 proved one of the most challenging years in the history of cybersecurity and SIEM in particular. With the COVID-19 pandemic forcing many enterprises of all sizes to switch abruptly to remote work, cybersecurity concerns took something of a backseat for some IT decision-makers. 

However, external threat actors took the opportunities provided by the chaos and confusion around COVID-19. In fact, COVID-19 offered hackers a new way to mask their attacks and new opportunities for crime. Therefore, 2020 also resulted in numerous businesses having to catch-up to a rapidly evolving threat landscape. Organizations relied not on established plans but on whatever worked efficiently. 

Read the Article Here

How to Learn More 

Thank you for reading our top SIEM articles of 2020. You can check out our endpoint security best practices here. Also, download our Free SIEM and SOAR Guides for more on our solution providers and key capabilities.

Keep up with the latest SIEM articles of 2020 and 2021 on social media.

Ben Canner

Ben Canner is an enterprise technology writer and analyst covering Identity Management, SIEM, Endpoint Protection, and Cybersecurity writ large. He holds a Bachelor of Arts Degree in English from Clark University in Worcester, MA. He previously worked as a corporate blogger and ghost writer. You can reach him via Twitter and LinkedIn.
Ben Canner