Meeting Ransomware Threats with SIEM

LegalTech News It used to be that security technologies comprised a preventative toolset including firewall, antivirus, web and email gateways. There was a clear distinction between “do-it-yourself” security approaches and … Continue reading



Analyst: Brexit Cybersecurity Ramifications Could be Significant

Infosecurity Magazine After 43 years of inclusion, the UK has voted to leave the European Union in the historically unprecedented “Brexit” referendum vote. Aside from causing uncertainty in the world’s … Continue reading



After trio of hacks, SWIFT addresses information sharing concerns

SC Magazine On the heels of published reports of a cyberattack last year in which hackers stole $9 million from an Ecuadorean bank, the Society for Worldwide Interbank Financial Telecommunication … Continue reading



What are the Challenges and Benefits of Outsourcing Security Functions?

Information Security Buzz EventTracker’s CEO, A.N. Ananth, answers the Informtion Security Buzz panel question for May, which discusses outsourcing security functions: Gartner forecasts that the total security outsourcing market will … Continue reading



Ransomware attacks prompt warnings to House members

SC Magazine EventTracker CEO, Ananth, is quoted in response to an increase in ransomware attacks at the U.S. House of Representatives. The attacks came via phishing emails that contained encrypted attachments with ransomware … Continue reading



Debate» To automate or not? You must realize the limitations of your incident response technology.

SC Magazine EventTracker CEO, Ananth, argues against automating incident response in SC Magazine’s Debate column. Read it here.   Debate» To automate or not? You must realize the limitations of your … Continue reading



Views on Cybersecurity, ‘Secure the Human’ and 2016 Concerns

Bloomberg BNA Privacy & Security Law Report Generally, employees make up the weakest link in the cybersecurity chain for companies. Bloomberg BNA Privacy & Data Security News Senior Legal Editor Jimmy … Continue reading



New products of the week 08.03.2015

Network World EventTracker version 8 made Network World’s list of Products of the Week for the week of August 3, 2015. See it here.   New products of the week … Continue reading



Why PCI DSS 3.1 has Followed 3.0 so Quickly

InfoSecurity Magazine PCI SSC has issued PCI DSS 3.1 outside its usual cycle in order to respond to threats. So what’s the emergency? A.N. Ananth, CEO of EventTracker, discusses the … Continue reading



Cool Tool – EventTracker

EdTech Digest Educational institutions face unique security challenges due to their open networks, essential for facilitating a collaborative exchange of information and ideas. EdTech digest wrote a brief review of … Continue reading



PCI DSS 3.1 – What Retailers Need to Know

Guest blog by EventTracker CEO, A.N. Ananth for Solution Providers for Retail The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that … Continue reading



When you Can’t Stop a Breach, you Should Still be Able to Spot it

Information Security Buzz A.N. Ananth, CEO of EventTracker, explains the importance of spotting a breach and how it’s possible with new process detection. Retailers have had an Annus Horribilis to … Continue reading



5 Laws of IT Security

MSPMentor Blog EventTracker CEO, A.N. Ananth, guest blogs in this edition of MSPMentor to bring you the Top 5 Laws of Security. 1. There is no such thing as perfect … Continue reading



If you Set and Forget, you will Regret

Information Security Buzz Overworked system administrators and their equally harried managers everywhere would love to hear from vendors that some SILVER BULLET security technology will keep them safe from all … Continue reading



Distribution veteran unveils new security VAD

Channel Pro UK Former Codework founder, Divyesh Lakhani, has lifted the curtain on a new security distribution venture that he claims is dramatically different to its rivals. Lakhani claims Distology will … Continue reading



The Seven Habits of Highly Fraudulent Users

Information Security buzz This post from Izzy at SiftScience describes patterns culled from 6 million transactions over a three month sample. The “fraud” sample consisted of transactions confirmed fraudulent by customers; … Continue reading



What Is a Stolen Credit Card Worth?

Solution Providers for Retail Cybercrime and stealing credit cards has been a hot topic all year. From the Target breach to Sony, the classic motivation for cybercriminals is profit. So … Continue reading



Whitepaper: Why EventTracker is the Best Choice for Security Information and Event Management

MSPmentor Offers a brief overview of the top 6 reasons EventTracker should be your security information and event management solution. Read the full  whitepaper at MSPmentor Whitepaper: Why EventTracker is the … Continue reading



Gartner Rates Security Solutions in Annual Magic Quadrant Report

Enterprise Security Today Gartner has just published its annual Magic Quadrant report for Security Information and Event Management (SIEM) Technology. In its report, the industry research firm rates 15 vendors … Continue reading



EventTracker 7.6: Digging Into Details for Intrusion Detection

Virtualization Review Finding security problems isn’t easy, with all the information generated by a typical datacenter. It’s worth your time to investigate solutions. A. N. Ananth, CEO of EventTracker, visited to … Continue reading



Security opportunities for MSPs

Computer Dealer News What is the biggest thing in tech news today? It’s not the cloud, and it’s definitely not “managed services.” With the advent of things like Office 365, … Continue reading



IT Supply Chains – Under Siege

A recent Gartner report finds that enterprise IT supply chains will be targeted and compromised, forcing changes in the structure of the IT marketplace and how IT will be managed … Continue reading



SMBs Can Meet Compliance Regulations with Cloud-Based SIEM Solution

IT Business Edge IT Business Edge interviews EventTracker’s A.N. Ananth about the use of cloud-based SIEM technology, like EventTracker Cloud, to meet regulatory compliance in small and midsized businesses.  Read … Continue reading



EventTracker Cloud: it’s not a SIEM; it’s an early-warning system

451 Group This paper, written by analyst Javvad Malik of the 451 Group, discusses EventTracker Cloud, a SaaS monitoring product for networks, systems and applications.  At the lowest level, EventTracker … Continue reading



NetworkWorld – Products of the Week

NetworkWorld EventTracker Cloud is featured as one of NetworkWorld’s Products of the Week.  See it here! NetworkWorld – Products of the Week was last modified: December 4th, 2015 by Narinder Bhambra



The State of Encryption, Part 1: Where Are We Now?

IDG Connect NSA revelations have placed an increased emphasis on encryption, with MIT Tech Review labeling 2014 “The Year of Encryption”. In a two part special, IDG Connect speaks to … Continue reading



Small Retailers, Big Target

Solution Providers for Retail Ananth’s guest blog discusses why retailers are big targets for hackers and lists some simple steps retailers can take to avoid a POS breach.  Read the … Continue reading



The healthcare USB storage device security conundrum

HealthITSecurity.com This article, written by A.N. Ananth, discusses how healthcare organizations can protect themselves and meet compliance requirements without compromising the benefits of USB devices.  Read the full article from HealthITSecurity.com, … Continue reading



How To Avoid Breaches Where You Least Expect Them

DarkReading A.N. Ananth comments as a security expert on how to detect attacks in less critical systems.  Read the full article in Dark Reading here. How To Avoid Breaches Where … Continue reading



Changeable default passwords are not seen as vulnerabilities by ICS-CERT, but should they be?

CSO Online While responding to a vulnerability report submitted in April, ICS-CERT told a researcher that documented, changeable default passwords are not vulnerabilities. But given the risk behind default passwords … Continue reading



Top 15 Indicators Of Compromise

DarkReading A.N. Ananth comments as an IT Security expert on the key indicators of a data breach. Read the full article in DarkReading, here. Top 15 Indicators Of Compromise was … Continue reading



7 Starter Steps For Security Analytics Success

DarkReading A.N. Ananth comments on how to quickly improve analytics work to better understand IT risks and adjust security practices in this DarkReading article. Read it here. 7 Starter Steps For … Continue reading



Getting the Compliance Budget “Just Right”

Infosecurity Magazine A risk aware, long-term approach to regulatory compliance budgets is the path toward optimized spending. EventTracker’s AN Ananth explains his Goldilocks strategy. Read the full article here.   … Continue reading



The keys to a compliance-ready records retention schedule

SearchCompliance A.N. Ananth comments on how to maintain different regulatory compliance standards with data retention plans and other compliance policies. Read the full article in SearchCompliance here. The keys to … Continue reading



In Fight Against Hacktivists, Financial Firms Need Layers of Security

Wall Street and Technology EventTracker’s CEO, A.N. Ananth comments on how companies should increase security to protect their networks from hacktivists and disgruntled employees.  The full article in Wall Street … Continue reading