Detection and Alerting: Selecting a SIEM
Summary Basic SIEM requirements should be in place to create mature detections for a variety of log sources, including network logs, system logs, and application logs (including custom applications). This focuses on Security Operations and does not include the engineering side of SIEM management, e.g., licensing, hardware/cloud requirements, retention needs, etc. Each component of the…
The post Detection and Alerting: Selecting a SIEM appeared first on TrustedSec.