Enterprises Blindly Battle Cyberthreat Intelligence with SIEM


Business owners may be deploying the latest technology to address cyberthreats, but many still aren’t sure what threats they’re facing. This according to a new study from the SANS Institute, which polled organizations about their activities to prevent cyberthreat intelligence from disrupting their organizations.

While 55 percent of organizations responding admitted to using security information and event management (SIEM) to keep their systems secure, many still don’t fully understand the threats they face. While SIEM has the power to provide valuable insight into the threats an organization faces, if businesses don’t understand what those threats are, it may not be as beneficial as it could be.

The Benefits of SIEM

If used to its fullest benefits, SIEM has the power to give a business valuable information about the threats it faces on a daily basis. But while the number of organizations embracing SIEM is growing, too many of them still rely on outside parties for this information. A company is likely to wait for its antivirus protection to catch these issues than to use SIEM to learn attack patterns and identify potential threats.

The Importance of Regular Monitoring

One issue facing many organizations is a failure to use the information that is readily available to them. By checking activity logs on a regular basis, an organization can learn more about security alerts deploying throughout the day. Even more important than being aware of these alerts is fully understanding them, however. Organizations should put this information to use in security firewalls and tightening vulnerabilities to keep their infrastructures safe.

SIEM is a valuable tool when used correctly. Many organizations fail to utilize these tools to their greatest advantages, however, rendering them ineffective in protecting a business against threats. By learning to extract logs and watch alerts, a business can better position itself to remain secure throughout the year.

Posted in IT Security and tagged , , , .

Leave a Reply

Your email address will not be published. Required fields are marked *