Splunk is powerful SIEM product widely in use by organizations and companies. Network/Security engineer can use it to search device logs using queries to filter interesting data. Here are some basic rules: If you are looking for specific string simply type a keyword in New Search field and press enter Wildcard is supported “*“ Search …
Category Archive: Security
Aug 05
PCI DSS levels
Aug 05
PCI DSS vs ISO 27001
PCI DSS and ISO 27001 are both security standards but it’s important to understand differences between them and how they apply to your organization. ISO 27001 is an international standard, with worldwide recognition, which lays down the requirements for the establishment of an information security management system. It applies to any type of organization, and …
Aug 05
SSL Certificate Types
The Secure Sockets Layer (SSL) and Transport Layer Security (TLS) is the most widely deployed security protocol used today. It is essentially a protocol that provides a secure channel between two machines operating over the Internet or an internal network. In today’s Internet focused world, the SSL protocol is typically used when a web browser …
Jul 29
SIEM overview
Security information and event management (SIEM) is a term for software products and services combining security information management (SIM) and security event management (SEM). SIEM technology provides real-time analysis of security alerts generated by network hardware and applications. SIEM components: 1) Log and context data collection 2) Normalization 3) Correlation (SEM) 4) Notification/Alerting (SEM) 5) …