SIEM - News, Features, and Slideshows
I have told you about the need to tune our security incident and event monitoring (SIEM) tool. Now we need to tune the analysts who are monitoring the SIEM.
By By Mathias Thurman | 28 August, 2014 22:46
Marketers at Domino's Pizza are gaining new and more immediate insights into online coupon usage from an unexpected source: a security management tool used by the national chain's IT department.
By Ellen Messmer | 24 October, 2013 19:08
ForeScout Technologies Tuesday introduced technology that allows other security vendors as well as third parties such as systems integrators to share monitoring and security-related information directly with ForeScout's CounterAct network-access control product.
By Ellen Messmer | 15 October, 2013 21:56
McAfee has unveiled a security appliance it calls McAfee Advanced Threat Defense which uses sandboxing technology to open incoming files to safely "explode" them to see if they contain stealthy malware.
By Ellen Messmer | 02 October, 2013 18:04
HP today took the wraps off its Next-Generation Firewall line designed to exert application-level controls and visibility over all traffic related to the enterprise, including mobile devices used in public WiFi settings and traffic from cloud services.
By Ellen Messmer | 17 September, 2013 14:26
Whitepapers about SIEM
Protecting against today’s rapidly evolving threat landscape requires broad and deep visibility across the entire IT environment. Threats and risks arrive from many angles and evidence of their existence can be found within existing log and machine data. Deeper, essential visibility is gained through targeted host and network forensic monitoring. When this is applied to multiple, machine-automated analysis techniques, threats and risks are exposed like never before.
When Canadian food distributor George Weston Limited moved to Microsoft Office 365, it chose F5 Application Delivery Controllers to centrally manage user traffic to its Active Directory Federation Services (ADFS) servers.
This helpful infographic on mobile enterprise management (MEM) details the driving forces behind this new trend, as well important considerations regarding impact on cost, productivity and security. • Increasingly, the devices used for businesses are no longer company-owned, meaning an increase in necessary IT support • Companies are most interested in device management to alleviate security and compliance concerns • BYOD models benefit companies and end users with cost savings, choice, and to demonstrate progressiveness from IT staff
- Think North Korea hacked Sony? Think about this
- Uber temporarily suspends service in Portland
- The 'grinch' isn't a Linux vulnerability, Red Hat says
- Hybrid cloud adoption set for a big boost in 2015
- Driver's license app on a smartphone raises privacy issues
- Worst security breaches of the year 2014: Sony tops the list
- Messaging app Line buys Microsoft's MixRadio music-streaming app
- Vulnerability in embedded Web server exposes millions of routers to hacking
- Amazon Web Services updates console to simplify management
- Uber driver in Boston area faces rape charges
- Sony hit with second employee lawsuit over hack
- Point-of-sale malware creators still in business with Spark, an Alina spinoff
- Microsoft nixes EU browser ballot screen
- U.S.-Cuba breakthrough is no slam dunk for Internet