SIEM - News, Features, and Slideshows
Marketers at Domino's Pizza are gaining new and more immediate insights into online coupon usage from an unexpected source: a security management tool used by the national chain's IT department.
By Ellen Messmer | 24 October, 2013 19:08
ForeScout Technologies Tuesday introduced technology that allows other security vendors as well as third parties such as systems integrators to share monitoring and security-related information directly with ForeScout's CounterAct network-access control product.
By Ellen Messmer | 15 October, 2013 21:56
McAfee has unveiled a security appliance it calls McAfee Advanced Threat Defense which uses sandboxing technology to open incoming files to safely "explode" them to see if they contain stealthy malware.
By Ellen Messmer | 02 October, 2013 18:04
HP today took the wraps off its Next-Generation Firewall line designed to exert application-level controls and visibility over all traffic related to the enterprise, including mobile devices used in public WiFi settings and traffic from cloud services.
By Ellen Messmer | 17 September, 2013 14:26
IBM today announced vulnerability-management capabilities available with its security information and event management (SIEM) product, called QRadar, that will let security managers identify network assets and prioritize network vulnerabilities for remediation.
By Ellen Messmer | 25 July, 2013 16:26
Whitepapers about SIEM
Everybody has logs and ultimately will have to deal with them. In this guide, Dr. Anton Chuvakin analyses the relationship between SIEM and log management for a new solution. · Security information and event management (SIEM) emerged in the 1990s, but it has always been controversial · This paper analyses the relationship between SIEM and log management, focusing on technical differences, uses and architecting joint deployments · Dr Chuvakin provides recommendations for companies that have deployed log management or SIEM so they can plot their roadmap for enhancing deployment
The explosion of smartphones and tablets in the workplace means that confidential information is now not only spread throughout your organization on servers and desktops, it is also being stored on mobile devices – which are prone to loss or theft – and being transmitted from these mobile devices beyond the control of your organization. It is easy for employees to disseminate – whether accidentally or intentionally – sensitive business data outside the organization with a simple action – e.g., upload employee healthcare records to the public cloud via a cloud storage app.
- ATO sets out treatment of Bitcoin
- Fair and Safe Work Qld invites offers for mobile app development
- China paving the way for big Xbox One sales
- 'Reveton' ransomware upgraded with powerful password stealer
- YouTube music might be a win for other Google services
- Many Chrome browser extensions do sneaky things
- CSG posts revenue of $199.2m
- In support of a fibre-to-the-premises NBN
- More than half of Australians play at work: Microsoft
- 5 cool new security research breakthroughs
- Citing super-busy schedule, Ballmer resigns from Microsoft board
- How Michael Gregoire plans to put CA back on track
- Uber hires an Obama insider for its political fights
- Ballmer's exit from Microsoft's board expected, boosts Nadella's standing, analysts say
- IT outages are an ongoing problem for the U.S government