The Ultimate Guide to Security Information and Event Management
2024 edition
Overview
Also known as SIEM.
Cybersecurity has rapidly emerged as an essential function for anyone using a computer and the internet. It is, however, a complex and dynamic field – and this is why Security Information and Event Management (SIEM) has emerged as a useful tool combating hackers and malware. SIEM integrates information from multiple systems and sources, providing an overview of the complete environment, identifying any anomalies or issues, and creating alerts so action can be taken to prevent or control emerging security problems.
Expert columns
By Ashley Diffey of Ping Identity
Steps to achieving cohesion across the security stack
This month
By Nils Krumrey of Logpoint
The convergence of endpoint security & automated invest...
Last month
By Matt Caffrey of Barracuda Australia
Advanced security tools can help bridge the cyber-skill...
Mon, 5th Feb 2024
By Winston Wong of Jamf
Updating Apple devices in the era of rapid security res...
Mon, 6th Nov 2023
By Leonardo Hutabarat of LogRhythm
Why securing smart grids is vital to the growth of smar...
Thu, 26th Oct 2023
Recent news
About IT Training
Acumen expands partnerships to bolster cyber security s...
3 days ago
About Downtime
Australian organisations face surge in ransomware attac...
4 days ago
About Firewall
Fortinet recognised as Challenger in Gartner's 2024 Mag...
Last week
About Productivity
SentinelOne announces Purple AI for enhanced cybersecur...
This month
About Managed Services
ExtraHop hires Simon Howe, eyes expansion in Australia ...
This month
More news
About Security intelligence
LogRhythm's Axon revolutionises security updates with l...
This month
About Testing
Telefónica Tech UK&I unveils NextDefense for future-pro...
Last month
About Awards
Tenable announces winners of 2024 Global Partner Awards
Last month
About Cloud Services
LogRhythm extends LRQA Nettitude collaboration to boost...
Last month
About Productivity
Exabeam pushes AI-driven security with Threat Center & ...
Last month
Even more news
About Advanced Threat Analytics
ManageEngine unveils machine learning feature in Log360...
Fri, 23rd Feb 2024
About Cyber Threats
Westcon-Comstor & CrowdStrike extend cyber tech partner...
Thu, 15th Feb 2024
About Global economy
Sovos appoints new VPs of sales for EMEA & LATAM region...
Thu, 1st Feb 2024
About Enterprise security
ExtraHop expands partnership with CrowdStrike for enhan...
Mon, 29th Jan 2024
About Malware
iboss unveils cybersecurity module to boost government ...
Wed, 10th Jan 2024
Job moves
Move at LogRhythm
LogRhythm appoints Joanne Wong as Interim Chief Marketi...
Last month
Move at LogRhythm
LogRhythm appoints Mazen Dohaji as GM & VP for new META...
Thu, 22nd Feb 2024
Move at Sophos
Sean Muirhead named Chief Product Officer at Logpoint
Wed, 7th Feb 2024
Move at Microsoft
SolarWinds appoints Brian Goldfarb as new Chief Marketi...
Wed, 31st Jan 2024
Move at LogRhythm
LogRhythm appoints Matthew Lowe as ANZ Country Manager ...
Tue, 31st Oct 2023
Other guides
You can read other related guides from Cybersecurity, User and Entity Behavior Analytics, Advanced Persistent Threat Protection, Artificial Intelligence, and Security Operations Centre.
Powered by