A Security Information and Event Management (SIEM) tool is a crucial component in modern cybersecurity strategies. SIEM systems collect, aggregate, and analyze log data from various sources across an organization’s IT infrastructure to provide real-time monitoring, threat detection, and incident response capabilities. Let’s explore Splunk and Chronicle SIEM tools through a story: The Tale of […]
Author: Ismail Altas
A Tytpical Audit Example With a Report
Alma Toys is an imaginaty company and they recently decided to open into global markets via online sales. Upon a Security Audit, we have found that there are many key security areas that the company lacks confiance. Here is the result of our audit : Alma Toys: Scope, goals, and risk assessment report Scope and […]
A Short Story of a Security Audit
Security audits are systematic evaluations of an organization’s information systems, practices, and controls to ensure they are adequate, effective, and compliant with established policies and regulations. Let’s explore this concept through a detailed scenario. It is is a review of an organization’s security controls, policies, and procedures against a set of expectations. Scenario: MediTech Innovations […]
OWASP Security Principles in a Nutshell
OWASP (Open Web Application Security Project) is a nonprofit foundation dedicated to improving software security. It provides valuable resources, tools, and guidelines for developers and security professionals to create and maintain secure applications. One of OWASP’s key contributions is its set of security principles, which guide developers in building robust and secure software. Let’s explore […]
NIST SP 800-53; A must know framework for any US government security specialists
The NIST CSF is a voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk. The confidentiality, integrity, and availability (CIA) triad represents the three foundational pillars of security. NIST SP 800-53 is a comprehensive set of security and privacy controls developed by the National Institute of Standards and Technology (NIST) […]
Confidentiality, Integrity, and Availability (CIA) triad
The CIA triad is a fundamental model in cybersecurity that consists of three core principles: Confidentiality, Integrity, and Availability. Let’s explore each component and then tie them together in a broader cyber attack scenario. Confidentiality Confidentiality refers to protecting sensitive information from unauthorized access or disclosure. It ensures that data is only accessible to those who […]
NIST’s 7 Steps Risk Management Framework
The NIST Risk Management Framework (RMF) provides a comprehensive, flexible, repeatable, and measurable 7-step process that any organization can use to manage information security and privacy risk for organizations and systems and links to a suite of NIST standards and guidelines to support implementation of risk management programs to meet the requirements of the Federal […]
How a security analysts use SIEM dashboards
Security analysts use SIEM dashboards to monitor, analyze, and respond to security events across an organization’s IT infrastructure. Let’s explore some common dashboard examples and create a story to illustrate their use cases.Common SIEM Dashboard Examples: Imagine a day in the Life of Sarah, the Security Analyst. Sarah, a senior security analyst at TechCorp, starts […]
Security information and event management (SIEM) tools
Security Information and Event Management (SIEM) tools are comprehensive cybersecurity solutions that collect, analyze, and correlate data from various sources across an organization’s IT infrastructure to detect and respond to security threats in real-time. Here we will dive into a detailed description of SIEM tools and three market-dominant brands: Splunk, IBM QRadar and Exabeam Fusion […]
Confidentiality, integrity, and availability (CIA) triad
The CIA triad consists of three core principles of information security: Now, let’s visualize these concepts through a story: The Tale of SecureBank’s Digital Transformation Sarah, the newly appointed Chief Information Security Officer (CISO) of SecureBank, was tasked with modernizing the bank’s online banking platform while ensuring robust security. She knew the CIA triad would […]