• Solutions Review
    • Application Development
    • Backup & Recovery
    • Business Intelligence
    • BPM
    • Content Management
    • CRM
    • Data Integration
    • Data Management
    • Data Storage
    • Endpoint Security
    • Enterprise Cloud Strategy
    • ERP
    • Identity Management
    • Marketing Automation
    • Mobility Management
    • Network Monitoring
    • SIEM
    • Talent Management
    • Wireless Network
  • About Us
  • Contact
  • SOAR Buyer’s Guide – Get it HERE!

Best Information Security SIEM Tools, Software, Solutions & Vendors

Link to Security Information and Event Management Buyer's Guide

Menu

  • News
  • Best Practices
  • Best Selling Books
  • Solutions Directory
    • SIEM
    • SOAR
    • MDR
  • Buyer’s Guide
    • SIEM
    • SOAR
    • MDR
  • Vendor Map
  • Resources
  • Contact Us

Data Breach

SOAR-Automation.jpg

More Expert Commentary and Coverage of the GetHealth Exposure

Experts and cybersecurity professionals continue their analysis of the GetHealth Exposure. Find out what they had to say here.  Yesterday, we covered the …

September 14, 2021Best Practices, Featured Read more
Dark-web-mod.jpg

T-Mobile Suffers Potential Data Breach; Over 100 Million Possibly Affected

Yesterday, T-Mobile confirmed investigating a potential data breach that could affect more than 100 million customers. Motherboard originally broke this …

August 16, 2021Best Practices, Featured Read more
stock-market-mod-2.jpg

UC San Diego Health Phishing Attack Exposes Medical Data

UC San Diego Health, the academic health system of the University of California, recently disclosed suffering from a phishing attack that resulted in a data …

July 28, 2021Best Practices, Featured Read more
ransomware-4-mod.jpg

Expert Commentary on the Geico Data Breach Disclosure

Insurance company Geico recently filed a data breach notice with the attorney general of California. According to the disclosure, the breach occurred between …

April 20, 2021Best Practices, Featured Read more
Dark-web-mod.jpg

The Microsoft Exchange Hack Increases Attack Volume on Massive Scale

The Microsoft Exchange Hack, covered previously in this article, continues to wreak havoc on businesses and governments around the world. Microsoft, working …

March 16, 2021Featured, SIEM News Read more
fileless-malware-mod.jpg

What the Mashable Data Breach Can Teach Businesses

Recently, multi-platform media and entertainment company Mashable reported it suffered a data breach; leaked readers’ information was discovered in a leaked …

November 9, 2020Featured, SIEM News Read more
new-hacker-image-resize-compressed.jpg

The Staples Data Breach: Why “Low Impact” Breaches Still Cause Serious Damage

The Staples Data Breach gives us to discuss the common discourse around “low-impact” security breaches. While sensitive data is of course more dangerous if …

September 15, 2020Best Practices, SIEM News Read more
new-hacker-image-resize-compressed.jpg

GE Discloses Service Provider Canon Suffered Data Breach

General Electric (GE), a Fortune 500 technology corporation, today disclosed a data breach of personally identifiable information of both current and former …

March 24, 2020Featured, SIEM News Read more
business-316906_960_720-mod.jpg

Security Experts Weigh In: The Recent NASA Data Breach

As cybersecurity experts reel from the deluge of data breach headlines as the holidays close in, it can be easy to miss some of them. Such is the case with the …

December 20, 2018Best Practices Read more
Untitled-1.jpg

Lessons From The Marriott Breach with Gates Marshall of CompliancePoint

The Marriott Breach—one of the largest breaches in the history of cybersecurity—dominated headlines over the weekend. 500 million customers had their vital …

December 3, 2018Best Practices Read more
← Older posts
IAM Solution Suggestion Engine

Featured Video


Udacity Cybersecurity Ad

Vendor Map Report SIEM

Top Posts & Pages

  • Key Takeaways: 2022 Gartner Magic Quadrant for Security Service Edge
    Key Takeaways: 2022 Gartner Magic Quadrant for Security Service Edge
  • Identity Management and Information Security News for the Week of August 19; Updates from Cerby, SailPoint, Transmit Security, and More
    Identity Management and Information Security News for the Week of August 19; Updates from Cerby, SailPoint, Transmit Security, and More
  • 7 Key SIEM Capabilities to Look For in Your Solution
    7 Key SIEM Capabilities to Look For in Your Solution
  • The 10 Best Open Source SIEM Tools for Businesses
    The 10 Best Open Source SIEM Tools for Businesses
  • Best Security Information & Event Management SIEM & Security Analytics Vendors, Companies, Software, Tools | Solutions Review
    Best Security Information & Event Management SIEM & Security Analytics Vendors, Companies, Software, Tools | Solutions Review
  • Security Information and Event Management & Security Analytics Solutions Directory
    Security Information and Event Management & Security Analytics Solutions Directory
  • Top 6 Information Security Books for Professionals
    Top 6 Information Security Books for Professionals
  • Top 5 Cybersecurity Intelligence Books for Professionals
    Top 5 Cybersecurity Intelligence Books for Professionals
  • The 6 Highest-Rated SIEM Books Available on Amazon
    The 6 Highest-Rated SIEM Books Available on Amazon
  • The 8 Key Features to Look For in a SIEM Solution
    The 8 Key Features to Look For in a SIEM Solution
Security Information & Event Management
Solutions Review brings all of the best Information Security thought leaders, news, best practices and events together in one place: Here at Solutions Review SIEM.
  • Twitter
  • Facebook
  • LinkedIn

Related Solutions Review Sites

  • Endpoint Protection
  • Identity and Access Management
  • Backup and Disaster Recovery
  • Business Intelligence
  • Mobile Device Management
My Tweets

Free SIEM Buyer’s Guide

Download link to SIEM Buyer's Guide
© 2012-2022 Solutions Review. All rights reserved.
Solutions Review - SIEM | Privacy Policy | Do Not Sell My Info
Top