Sigma language rules for SIEM

Motivated by the sudden growth of interest in Security Information and Event Management (SIEM)mechanisms worldwide, companies that develop cybersecurity products started building their own SIEMsolutions as soon as possible. Due to market share competition, each of these companies developedtheir own proprietary security rules formats and built their analysis engines to work best with thesespecific formats.Soon [...]

2020-10-12T10:09:30+00:00May 31st, 2019|Blog|

A skeptical view…

Just a thought, as we look at other possible competitors, etc. in cybersecurity, it’s best not to forget and keep a skeptical view of many “commercial” claims. Read –and enjoy! – this latest report from ProPublica, an independent and nonprofit newsroom that produces investigative journalism. In few words: companies that promised to beat ransomware with [...]

2019-05-21T09:27:35+00:00May 21st, 2019|Blog|

B as Baltimore (or Brussels…)

Sometimes we also ourselves think if what we are building in the CS-AWARE project is really useful and what someone may consider as “bare necessities” for a local public administration, or only some forward-looking, nice-to-have “stuff” which may better be described as a solution-in-search-of-a-problem. And then we read something like this here: A ransomware attack [...]

2019-05-20T13:23:13+00:00May 20th, 2019|Blog|
Go to Top