How the SolarWinds Attack Should Make You Rethink Your Third-Parties
How does the SolarWinds Attack alter how enterprises should rethink their third-parties in their IT environment? The story thus far: A hacking group …
How does the SolarWinds Attack alter how enterprises should rethink their third-parties in their IT environment? The story thus far: A hacking group …
What are the benefits of deploying a managed SIEM solution for your business security? How can it improve your SIEM performance, even to an optimal level? …
What is the role of SIEM today for businesses and workflows? This isn’t meant as an idle or a flippant question. Instead, it should provoke consideration of …
The Washington State Auditor Office disclosed suffering a data breach that exposed the personal information in 1.4 million employment claims. According to …
Why is SOAR’s (security orchestration automation and response) greatest asset security centralization for your business (also called orchestration)? Of …
Often, when we speak of onboarding in a cybersecurity context, we use an identity management lens. However, this isn’t the only lens we can or should use. In …
What is dwell time? Why does it matter for cybersecurity (or why does it keep cybersecurity professionals up at night)? How can a next-generation SIEM solution …
Solutions Review today is releasing its newly updated 2021 Buyer’s Guide for SIEM to assist organizations during the research and discovery phase of buying …
The editors of Solutions Review work to research SIEM on a constant basis. We compile technology research papers and reports, product updates, and capability …
What are the top data breaches of 2020? Finally, after one of the longest years in living memory, 2020 came to a close. We now stand in the first days of …