Download the Adlumin SIEM Checklist Here Adlumin SIEM Platform Checklist

Adlumin Syslog Collector Screenshot

Adlumin Secure Data Collector Application August 28, 2018 By: Dan McQuade One of the challenges we face as a cloud-based SIEM platform is the process of collecting data from a variety of disparate sources on a local network, and securely transmitting that data into our platform over the internet. These sources can include end-user PCs, […]

Enterprise-Level Data Science with a Skeleton Crew Originally published on datascience.com “Data science is a team sport.” As early as 2013, this axiom has been repeated to articulate that there is no unicorn data scientist, no single person that can do it all. Many companies have followed this wisdom, fielding massive data science operations. But […]

ACTIVE DEFENSE AND “HACKING BACK”: A PRIMER SCOTT BERINATO MAY 21 2018 In the lead piece in this package, Idaho National Lab’s Andy Bochman puts forth a provocative idea: that no amount of spending on technology defenses can secure your critical systems or help you keep pace with hackers. To protect your most valuable information, […]

Rob Johnston MSNBC

Protect Credit Union Assets from Sophisticated Hackers Today’s criminals have moved beyond ransomware and malware. From left: Tim Evans, chief of strategy; Don McLamb, Director of Engineering; and Rob Johnston, CEO. Financial institutions are prime targets for cybercriminals looking to gain access to volumes of consumers’ personal data and money. In 2017, the U.S. experienced […]

Password Safety and Complexity to Protect Your Accounts By James Warnken “The most used password in the world is 123456” A simple password like this is cracked in a matter of just a few seconds. Whereas, if your password contains one capital letter, lower case letters, and numbers it may take a few hours to […]

Fast company Weaponized Cyber Attacks

U.S. More Vulnerable To Weaponized Cyberattacks Than You Think Experts on a panel at SXSW warn major hacking onslaughts of our infrastructure, personal data, and businesses are coming—and we’re not ready. [Photos: Wokandapix/Pixabay; Flickr user Shinji Abe] BY DANIEL TERDIMAN3 MINUTE READ Until Americans get more serious about cybersecurity, the United States remains extraordinarily vulnerable to attacks from enemy […]