Honeypots Versus Threat Intelligence

Information Security Buzz When faced with daily reports of security breaches in global entities like SWIFT and Fortune 500 companies, and small enterprises being held hostage with ransomware, it’s understandable … Continue reading

Netsurion and EventTracker Merge to Boost SIEM Capabilities

eWEEK Privately held security vendor Netsurion announced on Oct. 13 that it is merging with security information and event management (SIEM) vendor EventTracker. Financial details of the merger are not … Continue reading

Managed Security Services Provider Netsurion Acquires SIEM Vendor EventTracker

CRN Over the past year or so, threat vectors for Netsurion’s customers have changed drastically, and CEO Kevin Watson said the managed security services provider knew it had to take … Continue reading

Netsurion, EventTracker merge, aim to bolster SMBs against complex cyberattacks

ZDNet Netsurion and EventTracker, two security companies, are merging in a move that aims to bring more enterprise-grade cybersecurity defenses to small and mid-sized businesses. The two companies focus on … Continue reading

Meeting Ransomware Threats with SIEM

LegalTech News It used to be that security technologies comprised a preventative toolset including firewall, antivirus, web and email gateways. There was a clear distinction between “do-it-yourself” security approaches and … Continue reading

Analyst: Brexit Cybersecurity Ramifications Could be Significant

Infosecurity Magazine After 43 years of inclusion, the UK has voted to leave the European Union in the historically unprecedented “Brexit” referendum vote. Aside from causing uncertainty in the world’s … Continue reading

After trio of hacks, SWIFT addresses information sharing concerns

SC Magazine On the heels of published reports of a cyberattack last year in which hackers stole $9 million from an Ecuadorean bank, the Society for Worldwide Interbank Financial Telecommunication … Continue reading

What are the Challenges and Benefits of Outsourcing Security Functions?

Information Security Buzz EventTracker’s CEO, A.N. Ananth, answers the Informtion Security Buzz panel question for May, which discusses outsourcing security functions: Gartner forecasts that the total security outsourcing market will … Continue reading

Ransomware attacks prompt warnings to House members

SC Magazine EventTracker CEO, Ananth, is quoted in response to an increase in ransomware attacks at the U.S. House of Representatives. The attacks came via phishing emails that contained encrypted attachments with ransomware … Continue reading

Debate» To automate or not? You must realize the limitations of your incident response technology.

SC Magazine EventTracker CEO, Ananth, argues against automating incident response in SC Magazine’s Debate column. Read it here.   Debate» To automate or not? You must realize the limitations of your … Continue reading

Views on Cybersecurity, ‘Secure the Human’ and 2016 Concerns

Bloomberg BNA Privacy & Security Law Report Generally, employees make up the weakest link in the cybersecurity chain for companies. Bloomberg BNA Privacy & Data Security News Senior Legal Editor Jimmy … Continue reading

New products of the week 08.03.2015

Network World EventTracker version 8 made Network World’s list of Products of the Week for the week of August 3, 2015. See it here.   New products of the week … Continue reading

Why PCI DSS 3.1 has Followed 3.0 so Quickly

InfoSecurity Magazine PCI SSC has issued PCI DSS 3.1 outside its usual cycle in order to respond to threats. So what’s the emergency? A.N. Ananth, CEO of EventTracker, discusses the … Continue reading

Cool Tool – EventTracker

EdTech Digest Educational institutions face unique security challenges due to their open networks, essential for facilitating a collaborative exchange of information and ideas. EdTech digest wrote a brief review of … Continue reading

PCI DSS 3.1 – What Retailers Need to Know

Guest blog by EventTracker CEO, A.N. Ananth for Solution Providers for Retail The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that … Continue reading

When you Can’t Stop a Breach, you Should Still be Able to Spot it

Information Security Buzz A.N. Ananth, CEO of EventTracker, explains the importance of spotting a breach and how it’s possible with new process detection. Retailers have had an Annus Horribilis to … Continue reading

5 Laws of IT Security

MSPMentor Blog EventTracker CEO, A.N. Ananth, guest blogs in this edition of MSPMentor to bring you the Top 5 Laws of Security. 1. There is no such thing as perfect … Continue reading

If you Set and Forget, you will Regret

Information Security Buzz Overworked system administrators and their equally harried managers everywhere would love to hear from vendors that some SILVER BULLET security technology will keep them safe from all … Continue reading

Distribution veteran unveils new security VAD

Channel Pro UK Former Codework founder, Divyesh Lakhani, has lifted the curtain on a new security distribution venture that he claims is dramatically different to its rivals. Lakhani claims Distology will … Continue reading

The Seven Habits of Highly Fraudulent Users

Information Security buzz This post from Izzy at SiftScience describes patterns culled from 6 million transactions over a three month sample. The “fraud” sample consisted of transactions confirmed fraudulent by customers; … Continue reading

What Is a Stolen Credit Card Worth?

Solution Providers for Retail Cybercrime and stealing credit cards has been a hot topic all year. From the Target breach to Sony, the classic motivation for cybercriminals is profit. So … Continue reading

Whitepaper: Why EventTracker is the Best Choice for Security Information and Event Management

MSPmentor Offers a brief overview of the top 6 reasons EventTracker should be your security information and event management solution. Read the full  whitepaper at MSPmentor Whitepaper: Why EventTracker is the … Continue reading

Gartner Rates Security Solutions in Annual Magic Quadrant Report

Enterprise Security Today Gartner has just published its annual Magic Quadrant report for Security Information and Event Management (SIEM) Technology. In its report, the industry research firm rates 15 vendors … Continue reading

EventTracker 7.6: Digging Into Details for Intrusion Detection

Virtualization Review Finding security problems isn’t easy, with all the information generated by a typical datacenter. It’s worth your time to investigate solutions. A. N. Ananth, CEO of EventTracker, visited to … Continue reading

Security opportunities for MSPs

Computer Dealer News What is the biggest thing in tech news today? It’s not the cloud, and it’s definitely not “managed services.” With the advent of things like Office 365, … Continue reading

IT Supply Chains – Under Siege

A recent Gartner report finds that enterprise IT supply chains will be targeted and compromised, forcing changes in the structure of the IT marketplace and how IT will be managed … Continue reading

SMBs Can Meet Compliance Regulations with Cloud-Based SIEM Solution

IT Business Edge IT Business Edge interviews EventTracker’s A.N. Ananth about the use of cloud-based SIEM technology, like EventTracker Cloud, to meet regulatory compliance in small and midsized businesses.  Read … Continue reading

EventTracker Cloud: it’s not a SIEM; it’s an early-warning system

451 Group This paper, written by analyst Javvad Malik of the 451 Group, discusses EventTracker Cloud, a SaaS monitoring product for networks, systems and applications.  At the lowest level, EventTracker … Continue reading

NetworkWorld – Products of the Week

NetworkWorld EventTracker Cloud is featured as one of NetworkWorld’s Products of the Week.  See it here! NetworkWorld – Products of the Week was last modified: December 4th, 2015 by Narinder Bhambra

The State of Encryption, Part 1: Where Are We Now?

IDG Connect NSA revelations have placed an increased emphasis on encryption, with MIT Tech Review labeling 2014 “The Year of Encryption”. In a two part special, IDG Connect speaks to … Continue reading

Small Retailers, Big Target

Solution Providers for Retail Ananth’s guest blog discusses why retailers are big targets for hackers and lists some simple steps retailers can take to avoid a POS breach.  Read the … Continue reading

The healthcare USB storage device security conundrum

HealthITSecurity.com This article, written by A.N. Ananth, discusses how healthcare organizations can protect themselves and meet compliance requirements without compromising the benefits of USB devices.  Read the full article from HealthITSecurity.com, … Continue reading

How To Avoid Breaches Where You Least Expect Them

DarkReading A.N. Ananth comments as a security expert on how to detect attacks in less critical systems.  Read the full article in Dark Reading here. How To Avoid Breaches Where … Continue reading

Changeable default passwords are not seen as vulnerabilities by ICS-CERT, but should they be?

CSO Online While responding to a vulnerability report submitted in April, ICS-CERT told a researcher that documented, changeable default passwords are not vulnerabilities. But given the risk behind default passwords … Continue reading

Top 15 Indicators Of Compromise

DarkReading A.N. Ananth comments as an IT Security expert on the key indicators of a data breach. Read the full article in DarkReading, here. Top 15 Indicators Of Compromise was … Continue reading