Issue OverviewInformation Security magazine - Special Edition, May 2013
Antivirus and intrusion prevention aren’t the threat detection stalwarts they used to be. With mobile endpoints and new attack dynamics, enterprises have to be nimble on the security front in order to keep data safe and attackers at bay. This Essential Guide will help you understand the latest in threat detection options, from whitelisting and sandboxing, to technologies that help you analyze and correlate attacks such as network monitoring, SIM and log management. Access >>>
Premium Content for Free.
The evolution of threat detection and management
by Michael Cobb, Application Security
Enterprises must understand the latest threat detection options to keep up with advanced cybercriminals who can bypass enterprise security defenses.
- The evolution of threat detection and management by Michael Cobb, Application Security
More Premium Content Accessible For Free
Threat intelligence and risk: Why cybersecurity hangs in the balance
As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above ...
How to respond to the latest distributed denial-of-service attacks
All indications show that DDoS attacks are increasing in variety, number and size. No network system is immune and information security pros can't ...
Figuring out FIDO as the first products emerge
The Fast Identity Online (FIDO) standards reached the public draft stage in February, and the first deployments of FIDO-ready technologies followed ...