Prepare to be breached: how to adapt your security controls to the “new normal”18th February 2015Fran Howarth The emphasis has switched from a strategy of preventing breaches, to one of being able to detect them and respond faster
HP reverts to type30th May 2012Philip Howard After Mike Lynch's resignation and 27,000 job cuts at HP do the company's software products have a future?
Themes for 201219th December 2011Philip Howard Some thoughts about may happen next year in the information management space
Collaborative SIEM solutions15th April 2011Philip Howard Combining SIEM products from different vendors may make sense
Simplifying rules7th April 2011Philip Howard LogRhythm's Advanced Intelligence Engine makes building correlation rules much, much easier
The problem with SIEM 27th May 2010Philip Howard The second in a series of articles about the architectural weaknesses of most SIEM products
The problem with SIEM 16th May 2010Philip Howard The first of four articles on the architectural weaknesses of most SIEM products
Bribery8th February 2010Philip Howard Bribery laws are coming to the UK, which will introduce a new area of compliance and opportunity for log management vendors
Spotlights18th December 2009Philip Howard Newly published spotlights on "spreadsheet governance" and "log and event management"
Research Agenda29th November 2009Philip Howard It is worth mentioning my research agenda. I am currently working on spreadsheet governance and log and event management (SIEM) as two separate stream