5 Technologies to Look for When Choosing a SIEM to Protect Your Organization in the Coronavirus Crisis

COVID-19 is wreaking havoc with our lives and our businesses, but hackers aren’t resting. If anything, we’ve seen the level of cyber attacks increase and specifically target new vulnerabilities. Those entrusted with protecting organizations don’t have the luxury to panic, but...

Read the full article

Mar 30, 2020

The Empowering Impact of Women at empow

Happy International Women's Day!  empow's R&D team is today 60% women.  How did we do it and what does it mean for the company culture?

Read the full article

Mar 08, 2020

Main Insights from Gartner’s SIEM Magic Quadrant Report

Every year the SIEM industry holds its breath for Gartner’s SIEM Magic Quadrant report. And for good reason. Gartner coined the term SIEM in 2005 and is still an authority on the SIEM industry.  The 2020 report holds some words of wisdom vendors should heed. Here are my three...

Read the full article

Feb 26, 2020

Inside the Matrix: MITRE ATT&CK™

When open source parsers utilize the MITRE ATT&CK Framework, security analysts can use their time much more effectively - investigating the nature of threats instead of sifting through endless logs.

Read the full article

Feb 19, 2020

Iran Is Using MITRE. You Should Too.

Iran cyber attacking the US is no longer a threat - it's our reality. How we can better prepare ourselves and make sure our SIEM is equipped to deal with this very serious threat?

Read the full article

Jan 09, 2020

Log analysis - SIEM SIEM, but different

Your Elastic stack is up and running, and you’re using Logstash for SIEM purposes. But you’re overwhelmed to discover that while every new system produces heaps and heaps of logs, each vendor uses their own data format, and employs a different set of values for describing...

Read the full article

Dec 25, 2019

The Secret to Getting More from Your SIEM

SIEM in a Nutshell

SIEM has come a long way since it first came on the scene, about twenty years ago. 

It began as a log management tool focused on simple collection and storage to meet compliance, and these use cases are still very relevant as 2020 draws nearer.

Initially,...

Read the full article

Dec 02, 2019

Next Generation SIEM - 6 Things to Look For

The SIEM market has evolved and today most solutions call themselves “Next Generation SIEM.” Effective NG SIEM should provide better protection and equally important, if not more, a much more effective, next gen user experience. What you should look for when evaluating a next...

Read the full article

Nov 17, 2019

Preventing Misconfiguration in Logstash with empow’s Pipeline Viewer

Elastic’s Logstash multi-pipeline feature, introduced in Version 6.7, is a cool feature, that enables us to easily and flexibly write, maintain, and manage our SIEM parsers. Nevertheless, the fact that it requires manual configuration may lead to serious misconfiguration...

Read the full article

Oct 01, 2019

How MITRE Helps Break Down the “Tower of Babel” for SIEM

Since its first days, cyber security developed in a patchwork fashion.  A security need came up, a product was developed to address it.  After many years of this, the whole contraption reflects the ad-hoc way in which it was formed, like a kid’s tower of blocks about to...

Read the full article

Jul 22, 2019
No More Posts