Splunk® VS Chronicle; A comparision for SIEM Tools

A Security Information and Event Management (SIEM) tool is a crucial component in modern cybersecurity strategies. SIEM systems collect, aggregate, and analyze log data from various sources across an organization’s IT infrastructure to provide real-time monitoring, threat detection, and incident response capabilities. Let’s explore Splunk and Chronicle SIEM tools through a story: The Tale of…

A Short Story of a Security Audit

Security audits are systematic evaluations of an organization’s information systems, practices, and controls to ensure they are adequate, effective, and compliant with established policies and regulations. Let’s explore this concept through a detailed scenario. It is is a review of an organization’s security controls, policies, and procedures against a set of expectations. Scenario: MediTech Innovations…

OWASP Security Principles in a Nutshell

OWASP (Open Web Application Security Project) is a nonprofit foundation dedicated to improving software security. It provides valuable resources, tools, and guidelines for developers and security professionals to create and maintain secure applications. One of OWASP’s key contributions is its set of security principles, which guide developers in building robust and secure software. Let’s explore…

NIST SP 800-53; A must know framework for any US government security specialists

The NIST CSF is a voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk. The confidentiality, integrity, and availability (CIA) triad represents the three foundational pillars of security. NIST SP 800-53 is a comprehensive set of security and privacy controls developed by the National Institute of Standards and Technology (NIST)…

Confidentiality, Integrity, and Availability (CIA) triad

The CIA triad is a fundamental model in cybersecurity that consists of three core principles: Confidentiality, Integrity, and Availability. Let’s explore each component and then tie them together in a broader cyber attack scenario. Confidentiality Confidentiality refers to protecting sensitive information from unauthorized access or disclosure. It ensures that data is only accessible to those who…

Security information and event management (SIEM) tools

Security Information and Event Management (SIEM) tools are comprehensive cybersecurity solutions that collect, analyze, and correlate data from various sources across an organization’s IT infrastructure to detect and respond to security threats in real-time. Here we will dive into a detailed description of SIEM tools and three market-dominant brands: Splunk, IBM QRadar and Exabeam Fusion…

Confidentiality, integrity, and availability (CIA) triad

The CIA triad consists of three core principles of information security: Now, let’s visualize these concepts through a story: The Tale of SecureBank’s Digital Transformation Sarah, the newly appointed Chief Information Security Officer (CISO) of SecureBank, was tasked with modernizing the bank’s online banking platform while ensuring robust security. She knew the CIA triad would…