5 SIEM Challenges that Cause the Most Stress

Are you experiences any of these SIEM challenges? We get it. We see these every day and we are here to help. Do you agree…
People, Process, Technology in Cybersecurity or: How I Learned to Stop Worrying and Love the Process!

People, Process, and Technology is the cornerstone of ITIL, but can it also be used to ensure a proper cybersecurity foundation? The answer may surprise you!
Is My Company Secure?

Saying “My company is secure” is like saying “My team scored 27 tonight”. The metric doesn’t matter if you have nothing to compare it against. Enter the framework.
A framework is a standardized methodology for selecting, implementing, testing, and maintaining a set of security metrics, also called security controls. There are many frameworks to choose; NIST, ISO, NERC, PCI, etc., etc. The point is that you want to compare yourself against a known yardstick.
How to Fine-Tune a SIEM

It’s no longer a matter of IF, but WHEN you will be attacked; companies similar to yours are experiencing breaches daily. Regardless of the size of your business, we are all a potential target for a hacker.
Enter the SIEM. You’ve selected the technology, implemented it, and are now collecting all the data on all security events that happen within your infrastructure
Cybriant named Atlanta Business Chronicle Pacesetter, one of Atlanta’s Fastest-Growing Private Companies

Cybriant, a leader in cybersecurity services, was recently named the 22nd fastest growing private company in Atlanta by the Atlanta Business Chronicle.
The annual list ranks the top 100 qualifying companies based on their revenue and employee growth. See the full list here.
Watch On-Demand: How to Prepare for GDPR

GDPR, or General Data Privacy Regulation, will come into force on 25 May 2018. GDPR requires organizations to maintain a plan to detect data breaches, regularly evaluate the effectiveness of security practices, and document evidence of compliance.
Andrew Hamilton, Cybriant CTO, to speak at KSU

Andrew Hamilton has been selected to speak in the current IS Department speaker series at Kennesaw State University. In his presentation “Do what works, not what’s flashy,” he will discuss information overload, building a security foundation without hype, what to do and why it works.
Incredible Managed SIEM Use Cases

Given different challenges facing security departments, security monitoring is vital. Security professionals now feel the deck is stacked against them as cybercriminals continue to attack. Many organizations are outsourcing to third-party vendors for faster and better detection.
March 2018 Data Breach Update

The business sector was the leader for the number of breaches in March 2018 with 45 breaches. These are breaches that are confirmed through media sources and/or notifications from state governmental agencies. The medical/healthcare industry had the second highest percentage of recorded breaches at 21 percent (19 breaches).
Are you experiencing Notification Overload?

Based on a recent study on the State of the SOC, security practitioners from enterprise organizations are overwhelmed by the sheer volume of alerts and investigations that require their attention.