October 24, 2017
A SIEM Buyer’s Guide for Resource-Constrained State and Local IT Security Teams premium
Cybersecurity is the number one priority for state and county CIOs, according to GovTech. Yet supporting that priority is a perpetual challenge. Another survey finds that top of the list of workforce needs for state CIOs is cybersecurity talent. But imagine if there were no cybersecurity workforce drought. That small government IT security shops had […]
DLT Solutions
October 11, 2017
Threat Hunting and Your SIEM: 10 Reasons Why You Need Both premium
I bet there was a time you loved your security information and event management (SIEM) system. This central location for managing all the security events on your network. But, as good as it may seem, many IT organizations have a love/hate relationship with their SIEM. Less than 25% of security professionals are getting full value […]
Government Tech Writer
February 14, 2017
How Smaller IT Shops Can Control the Cost of SIEM premium
A security information and event management (SIEM) system is an essential part of any security strategy and can help you pass a compliance audit (think ISO 27001, which requires event data to be aggregated from multiple systems). But SIEMs can be expensive, time-consuming, and hard work, especially for smaller, resource-constrained government IT departments, which often […]
DLT Solutions
December 21, 2016
Supercharge Your SIEM with Threat Hunting premium
Security Information Event Management (SIEM) tools have been around for quite some time. SIEMs are great for aggregating log files, parsing them, and using real-time correlation rules to spot security incidents. But more advanced incidents can evade detection by your SIEM. Finding those evasive threats becomes a lot easier if you employ threat hunting. Threat […]
Government Tech Writer
January 30, 2015
Feds are Ignoring Insider Threats to Cybersecurity, New Survey Reveals premium
One of the biggest threats to the security of government data and systems doesn’t come from rogue hackers or nations, it comes from within. As we revealed in The 4 Biggest Cybersecurity Threats of 2014, the careless and untrained government employees represent the top source of security threats to federal agencies. A recent survey of […]

Privacy Preference Center

Close your account?

Your account will be closed and all data will be permanently deleted and cannot be recovered. Are you sure?

Are you sure?

By disagreeing you will no longer have access to our site and will be logged out.