Perfect headline and I like #1 and #6.
Short and sweet article
From the article:
- Collect everything
- Poor source data health
- Overcomplicated network models
- Too much focus on top 10
- Lost in compliance
- Using a SIEM (disproportionately) as a log search too
For more info:
http://h30499.www3.hp.com/t5/HP-Security-Products-Blog/6-ways-to-screw-up-a-SIEM-implementation/ba-p/6758713
No comments:
Post a Comment