SOCVue ROI Calculator
Welcome to the Cygilant Blog

Why are Cybersecurity Programs Thankful for SIEM and Patch Management?

Posted by Neil Weitzel on Nov 27, 2017

As you are coming back from the Thanksgiving weekend and looking forward to the holiday season with friends and family we wanted to take a moment to explain what we are thankful for at Cygilant. 

As many know, security information and event management (SIEM); the part of a cybersecurity program that analyzes real-time events and alerts triggered by software or devices has been around quite some time.  At Cygilant we have spent over a decade building a platform for analyzing SIEM data.  It was not an easy task. As many in the security industry know, working with SIEM data is no small undertaking. So, to say we are very thankful for vendors and technologists that continue to develop and support SIEM is an understatement.

Hidden Costs to Building a Security and Compliance Practice

Posted by Robert Porzio on Aug 25, 2016

Today’s already vast cyber threat landscape is growing rapidly. Developments in the state of business, commerce, and big data have caused security and compliance challenges—historically concerns for large enterprises—to apply to the small and mid-market. What’s more, data breaches have a growing business impact, as 60 percent of SMBs fail within 6 months of a data breach. This is causing security spending, fueled by the SMB market, to rise to a projected $81 billion just this year.

Making Sense of Information Security Technologies: IDS/IPS, UTM, and SIEM

Posted by Trevan Marden on Mar 25, 2016


Because threats have become so advanced in recent years, technologies have continued to evolve to keep pace with the latest threat vectors. If you’ve been looking into ways to improve your organization’s information security posture, you may be left with a dizzying array of different technologies that all work in different ways to improve different aspects of your security posture. You may be left wondering what is the difference between technologies such as IDS/IPS, UTM, and SIEM. Let’s look at some of the basic differences in approaches between the technologies.

Stop Procrastinating: Why Executives Need to Prioritize Cybersecurity

Posted by Shawn O'Brien on Mar 10, 2016


In spite of the headline-making hacks of Sony, Anthem, and many other organizations, many business executives still haven’t prioritized cybersecurity as a top concern. A 2015 NTT Com Security survey showed that half of its participants were not prepared for a cyber attack. Yet hacks are becoming more frequent, and hackers are taking more creative approaches and finding more opportunities to strike. Executives that neglect cybersecurity place their companies at greater risk of a data breach.

How to Bolster Your IT Security Program

Posted by Security Steve on Feb 23, 2016

With today’s elevated security threat level and related economic impact, it makes sense to do everything you can to secure your organization’s servers, desktops, and devices. How do you keep the bad guys out while securing and enabling day-to-day business? Many companies use SIEM tools for threat detection, compliance, and asset protection. I’d like to suggest a couple of additional layers of security.


An effective security program is a balance of people, process, and technology. When evaluating an IT security monitoring solution, it is important to consider each of these areas in the decision-making process. Your organization also needs to determine which areas should be handled internally and which should be co-managed with a trusted partner. Let’s take a look at each:


You Don’t Have to Go it Alone

Posted by Security Steve on Feb 3, 2016

There are a lot of things in life we do alone, but if you are like most people, chances are you prefer the company of others, particularly when it comes to doing something that is difficult. It’s often through others that we get the help and guidance we need. For example, we look to Accountants this time of year to help us with the preparation of our taxes. So who is helping you with all of your IT security needs? When you think about everything you need to do, it’s clear that you really need to rely on other people. Let’s consider your to-do list for a minute:

The Most Alarming Assumptions About Network Security

Posted by Shawn O'Brien on Jan 15, 2016


Many small- to medium-sized enterprises haven’t given enough attention to network security monitoring of their cyber defenses. But not properly surveying an organization's network for threats can lead to dangerous results. Here are three of the biggest misunderstandings about network security monitoring.

Assumption #1: Endpoint Security Is Enough

It’s a common assumption that if the network entry points made by individual devices—employee laptops, warehouse processing terminals—are secure, then nothing else needs to be done. Familiarity with common endpoint security such as anti-virus scanners and anti-spyware programs breeds a false sense of security. Simply because individual devices are secure does not mean the overall network is safe from cyber threats.


New Year’s Resolutions: A 2016 Security Checklist

Posted by Shawn O'Brien on Jan 13, 2016


The start of a new year provides an opportunity for organizations to review their operations—and strengthen digital security wherever it is lacking. Evidence suggests more hacking scandals will occur in 2016, and since no business wants to be the next headline-making hack victim, strong cyber defenses are a must. Here is a checklist of three cybersecurity tools IT teams should have in order to protect their computer assets this year.

10 Tips for a Successful SIEM Deployment

Posted by Shawn O'Brien on Dec 28, 2015

Many organizations turn to security information and event management (SIEM) to meet their cyber defense needs, but they often end up with a disappointing experience. While SIEM can be a great tool in handling cyber attacks, it’s only helpful when deployed well.

In the webinar “10 Tips for a Successful SIEM Deployment,” for the SC Magazine SIEM eSymposium, EiQ Product Manager Kevin Landt talks about common challenges organizations face when deploying SIEM, and offers tips for how to successfully set it up. Here are the key takeaways from the webinar:

Don't Waste Your Money on SIEM

Posted by Kevin Landt on Dec 18, 2015

Security information and event management (SIEM) can be an effective solution for repelling and remediating cyber attacks, but if deployed poorly, it can be a waste of money. In a webcast recording from the 2015 SC Magazine SIEM eSymposium, EiQ Product Manager Kevin Landt discusses four ways you're wasting your money on SIEM, the criteria for determining SIEM’s necessity, three considerations for SIEM deployment, and EiQ’s relevant services.

Subscribe to Email Updates

How Much Could You Save?

Find out now with our
60-second ROI calculator!


Most Popular Posts

Posts by Topic

See All