Security Technology & Operations

CallStranger Vulnerability Affects Billions of IoT Devices

A vulnerability named CallStranger has been discovered, which exploits the Universal Plug-and-Play (UPNP) protocol used by billions of internet-connected devices. These...

Privacy Regulation Roundup

This Privacy Regulation Roundup summarizes the latest major global privacy regulatory development, announcements, and changes. This report is updated on a monthly basis.

Transactional Email Service Gives Retarus a Leg Up on the Competition

Retarus, a managed service cloud-based email security platform, is a growing company to watch out for. Since its initiation in 1992, it has quickly expanded its services...

Azure Sentinel: What is it, What are the Four Key Security Fundamentals, and Why You Should Know About It

Microsoft’s cloud Security Incident Event Management (SIEM) solution leverages modern day enhancements such as Security Orchestration Automated Response (SOAR), Machine...

“Unsafe” Code Uncovered in Chrome Browser (and Chromium-Based Browsers)

Google has identified “unsafe” code in the Chromium web browser engine. This flaw introduces a potential vulnerability that effects Google Chrome, as well as all...

Rapid7 – Key Reasons Around Cloud-Native SIEM

In today’s world many security teams require a simplified holistic method to consolidate disparate log data, threat anomalies, and responses. Due to these pressured...

Information Security Policy Charter Template

The Information Security Policy Charter is the “policy of policies” which outlines high-level security governance within the organization and the expectations associated...

Global Security Information and Event Management Market Size Is Expected to Reach $6 Billion by 2026

KBV Research released its Global Security Information and Event Management (SIEM) Market Forecast report last month. In light of the recent COVID-19 pandemic, the SIEM...

Two New Zoom Vulnerabilities Uncovered – Upgrade Now!

Two new vulnerabilities in Zoom’s web conferencing software were discovered in early June 2020. The vulnerabilities could allow malicious actors the ability to execute...

Making Sense of SIEM Pricing: Pricing by Data Volume

As the Security Information and Event Management (SIEM) market continues to grow, organizations now have more options than ever to decide which SIEM is right for them....
GET HELP Contact Us
×
VL Methodology