Hide this notification We use cookies to track statistics on our website. When you visit our website, you agree this

For a free and secure internet.

No active alerts
Show all threats

Blog

What do phishers do with your information?

DearBytes doet regelmatig onderzoek naar phishing websites die informatie proberen te ontfutselen aan bezoekers. Daarbij gaat het bijvoorbeeld om de inloggegevens voor een e-mailaccount (Gmail, Outlook, Yahoo, etc.), voor een betaaldienst zoals PayPal, of creditcardgegevens. Maar wat gebeurt er nu eigenlijk met de informatie nadat een phisher deze heeft weten te bemachtigen?Read more »

SIEM: data quality over quantity

In the world of SIEM, there are two approaches to retrieve specific information from SIEM: data quantity and data quality. Both approaches have their pros and cons and in the real world it often comes down to a mix of the two. This means that we must adopt a hybrid approach for importing data into SIEM.Read more »

Use cases versus hunting

Use cases are a traditional approach to gain insight into incidents in SIEM. The approach that is now emerging is that someone skilled in SIEM is hunting for new threats. Thinking out of the box is an important aspect of this approach. For example, can I stop this process remotely? What may cause critical business processes to fail?Read more »

SC Magazine recently has reviewed McAfee Enterprise Security Manager

SC Magazine recently has reviewed McAfee Enterprise Security Manager (ESM). The result is that SC Magazine recognized McAfee ESM as SC Labs Approved with a five star rating. The magazine states that McAfee Enterprise Security Manager, the heart of Intel Security’s Security Information & Event Management (SIEM) solution, is the gold standard for enterprise grade SIEMs.Read more »

Improve your IT- Security, more questions?

Our specialists are happy to help you.