Security Information and Event Management Series Part 4: Selecting a SIEM vendorIn this last part of our series on SIEM, we will try to provide recommendations on selecting a SIEM vendor.... BLOG What Is The Average Time To Detect Data Breaches And How To Reduce It? November 3, 2020 On this information superhighway we’re on, data has become one of the most sought after and valuable assets. Whether it’s... Security Information and Event Management Series Part 3: Main capabilities of SIEM November 2, 2020 In the first part of this four-part series, we covered the need for SIEM solutions and explained the fundamentals. Then,... Security Information and Event Management Series Part 2: Types of SIEM solutions October 26, 2020 In the first part of this four-part series, we covered the need for Security Information and Event Management (SIEM) solutions... What Is Cyber Kill Chain Process? October 23, 2020 Cyber Kill Chain is a concept branded by Lockheed Martin, that describes how the attacker proceeds with his steps during... Security Information and Event Management Series Part 1: Introduction To SIEM October 19, 2020 Cyber-attacks are consistently increasing, and as a result, so is the resulting damage. While attackers can target any organization as... What is the SIM3 Model? October 9, 2020 An organization’s incident response process must aim for continual improvement. It cannot achieve perfectness in its incident response right from... What to Include in the Incident Response Form? October 8, 2020 The definition of a “security incident” can include any incident that violates an organization’s security policies or harms its security... Steve Durbin, Managing Director at the ISF Interview with Ondrej Krehel About Current Cyber Threats October 1, 2020 ISF Podcast: A Digital Forensics Specialist on Data Breaches It is an unavoidable fact that businesses and organizations’ sensitive information... Advantages of Cyber Incident Retainers August 25, 2020 Being on constant alert for cyber threats to your organization is a must. A cyber-attack can strike your organization at... What is DNS Spoofing? July 13, 2020 DNS Spoofing is a type of Cyber Security attack where a user accidentally navigates to an attacker’s website which is... Cyber Security Webinar On-Demand: Workforce Diaspora – Adapting to Secure the Remote Workforce June 1, 2020 Free cyber security webinar on demand powered by LIFARS and Darktrace: “Workforce Diaspora – Adapting to Secure the Remote Workforce”... Importance of Project Management in Cyber Security April 6, 2020 In today’s era, there is a need for project management skills in the Cybersecurity world. Every Project management team should... Private CISO Breakfast with the LIFARS and US Secret Service October 23, 2019 On October 22, 2019 LIFARS, LLC hosted a privileged breakfast event alongside with the U.S. Secret Service. On behalf of... 2019 IANS Information Security Forum in Chicago September 6, 2019 September 16-17, 2019 Chicago IANS Information Security Forum. LIFARS, LLC invite you to join us as we create the future...
Security Information and Event Management Series Part 4: Selecting a SIEM vendorIn this last part of our series on SIEM, we will try to provide recommendations on selecting a SIEM vendor....
BLOG What Is The Average Time To Detect Data Breaches And How To Reduce It? November 3, 2020 On this information superhighway we’re on, data has become one of the most sought after and valuable assets. Whether it’s... Security Information and Event Management Series Part 3: Main capabilities of SIEM November 2, 2020 In the first part of this four-part series, we covered the need for SIEM solutions and explained the fundamentals. Then,... Security Information and Event Management Series Part 2: Types of SIEM solutions October 26, 2020 In the first part of this four-part series, we covered the need for Security Information and Event Management (SIEM) solutions... What Is Cyber Kill Chain Process? October 23, 2020 Cyber Kill Chain is a concept branded by Lockheed Martin, that describes how the attacker proceeds with his steps during... Security Information and Event Management Series Part 1: Introduction To SIEM October 19, 2020 Cyber-attacks are consistently increasing, and as a result, so is the resulting damage. While attackers can target any organization as... What is the SIM3 Model? October 9, 2020 An organization’s incident response process must aim for continual improvement. It cannot achieve perfectness in its incident response right from... What to Include in the Incident Response Form? October 8, 2020 The definition of a “security incident” can include any incident that violates an organization’s security policies or harms its security... Steve Durbin, Managing Director at the ISF Interview with Ondrej Krehel About Current Cyber Threats October 1, 2020 ISF Podcast: A Digital Forensics Specialist on Data Breaches It is an unavoidable fact that businesses and organizations’ sensitive information... Advantages of Cyber Incident Retainers August 25, 2020 Being on constant alert for cyber threats to your organization is a must. A cyber-attack can strike your organization at... What is DNS Spoofing? July 13, 2020 DNS Spoofing is a type of Cyber Security attack where a user accidentally navigates to an attacker’s website which is... Cyber Security Webinar On-Demand: Workforce Diaspora – Adapting to Secure the Remote Workforce June 1, 2020 Free cyber security webinar on demand powered by LIFARS and Darktrace: “Workforce Diaspora – Adapting to Secure the Remote Workforce”... Importance of Project Management in Cyber Security April 6, 2020 In today’s era, there is a need for project management skills in the Cybersecurity world. Every Project management team should... Private CISO Breakfast with the LIFARS and US Secret Service October 23, 2019 On October 22, 2019 LIFARS, LLC hosted a privileged breakfast event alongside with the U.S. Secret Service. On behalf of... 2019 IANS Information Security Forum in Chicago September 6, 2019 September 16-17, 2019 Chicago IANS Information Security Forum. LIFARS, LLC invite you to join us as we create the future...
What Is The Average Time To Detect Data Breaches And How To Reduce It? November 3, 2020 On this information superhighway we’re on, data has become one of the most sought after and valuable assets. Whether it’s...
Security Information and Event Management Series Part 3: Main capabilities of SIEM November 2, 2020 In the first part of this four-part series, we covered the need for SIEM solutions and explained the fundamentals. Then,...
Security Information and Event Management Series Part 2: Types of SIEM solutions October 26, 2020 In the first part of this four-part series, we covered the need for Security Information and Event Management (SIEM) solutions...
What Is Cyber Kill Chain Process? October 23, 2020 Cyber Kill Chain is a concept branded by Lockheed Martin, that describes how the attacker proceeds with his steps during...
Security Information and Event Management Series Part 1: Introduction To SIEM October 19, 2020 Cyber-attacks are consistently increasing, and as a result, so is the resulting damage. While attackers can target any organization as...
What is the SIM3 Model? October 9, 2020 An organization’s incident response process must aim for continual improvement. It cannot achieve perfectness in its incident response right from...
What to Include in the Incident Response Form? October 8, 2020 The definition of a “security incident” can include any incident that violates an organization’s security policies or harms its security...
Steve Durbin, Managing Director at the ISF Interview with Ondrej Krehel About Current Cyber Threats October 1, 2020 ISF Podcast: A Digital Forensics Specialist on Data Breaches It is an unavoidable fact that businesses and organizations’ sensitive information...
Advantages of Cyber Incident Retainers August 25, 2020 Being on constant alert for cyber threats to your organization is a must. A cyber-attack can strike your organization at...
What is DNS Spoofing? July 13, 2020 DNS Spoofing is a type of Cyber Security attack where a user accidentally navigates to an attacker’s website which is...
Cyber Security Webinar On-Demand: Workforce Diaspora – Adapting to Secure the Remote Workforce June 1, 2020 Free cyber security webinar on demand powered by LIFARS and Darktrace: “Workforce Diaspora – Adapting to Secure the Remote Workforce”...
Importance of Project Management in Cyber Security April 6, 2020 In today’s era, there is a need for project management skills in the Cybersecurity world. Every Project management team should...
Private CISO Breakfast with the LIFARS and US Secret Service October 23, 2019 On October 22, 2019 LIFARS, LLC hosted a privileged breakfast event alongside with the U.S. Secret Service. On behalf of...
2019 IANS Information Security Forum in Chicago September 6, 2019 September 16-17, 2019 Chicago IANS Information Security Forum. LIFARS, LLC invite you to join us as we create the future...