Respecting Users' Privacy
Personally Identifiable Information
You may wish to request information about our products and services. To facilitate the distribution of this content, you are asked to provide information, such as, but not limited to, name, company, title, phone number, e-mail address, site name, URL, and address. Based on the your request, Seven Stones Information Security may also ask for additional information, such as number of page views your site receives, how many orders your site receives, and how you heard about us. This is information is provided by you on a voluntary basis only and is not required by us in order for you to use and enjoy our site.
Collected Personal Data
Seven Stones Information Limited may use the information that we collect on the Site to contact you to further discuss your interest in our company, our services, and to send information regarding our company or partners, such as marketing promotions and events. This information may also be used to improve the services we provide you. The information is collected and stored in a manner that is appropriate for the nature of the data that we collect, and the need to fulfill your request. This information is not provided or sold to third parties for their use. Seven Stones Information Security uses secured server areas and advanced firewall technology to minimize the risk of security breaches for individually identifiable information that is volunteered on the Site. Though we make every effort to preserve user privacy, we may need to disclose personal information when required by law, or in order to comply with a current judicial proceeding, a court order, or legal process served on the Site. We will of course notify you should such a situation occur.
Our Site has security measures in place to help protect against the loss, misuse, and alteration of the data under our control. When sensitive on our Site are accessed using Netscape Navigator, Microsoft Internet Explorer versions 5.0, or higher, Secure Socket Layer (SSL) technology protects information using both server authentication and data encryption to help ensure that the data is safe, secure, and available only to you and us. Seven Stones Information Security also provides unique usernames and passwords that must be entered each time a customer logs on to an Seven Stones Information Security product via this Site. These safeguards help prevent unauthorized access, maintain data accuracy, and help ensure the appropriate use of all data. The webserver is protected by a firewall to provide network access control.
Third Party Sites
Latest Blog Post
SIEM - Windows Events Quick Win
June 21, 2021, 7:08 p.m.
There has been a modicum of interest in a Windows spreadsheet I shared on social media recently, that if absorbed and acted upon, can be a early no-brainer win with SIEM products that are licensed based on volume or Events Per Second (EPS).
Its no big secret that Windows machines, virtual or real, are noisy. Clients I worked with - I would estimate 90%, for various reasonsdon't act on the noise from Windows devices and it's costing them a fortune (right or wrong, approx 50% of those prioritise other tasks).
In Splunk, one can use searches to estimate the benefit of removing noisy Windows events, and what I found was quite a broad range of results. It makes little sense to give the full breakdown because the result depends heavily on the spread and amount of Windows to other Operating Systems (OS). But there were a couple of cases where logging events volume was reduced by 70%.
Security De-engineering, published by Taylor Francis, covers ubiquitous problems in information security and offers a solution in the final chapter
Areas covered: Penetration testing, Hackers, CASEs (Checklists and Standards Evangelists), IDS, Cloud Security, jobs in security, Identity Management, and organisational elements.