Issue OverviewInformation Security magazine - March 2012
Access this issue now and examine how SIEM is leading the charge in building a coordinated view of security-related information and event integration (including integrating fraud detection data and network access control technologies to name a few) and uncover new strategies for developing an enhanced SIEM capability and more. Access >>>
Premium Content for Free.
Unlocking the opportunity of SIEM technology
by Andrew Hutchison
Learn about SIEM technology and how to unlock the opportunity for SIEM technology to be a powerful technique in the fight against cybercrime.
NGFW: Getting clarity on next-gen firewall features
by Diana Kelley
There’s a lot of hype about next-generation firewalls. Here’s what you need to know.
- Unlocking the opportunity of SIEM technology by Andrew Hutchison
The RSA breach: One year later
by Marcia Savage
The attack on RSA shook the security industry to its core: A look at the breach’s far reaching impact.
Symantec breach highlights remote management holes
by Robert Westervelt
Poorly configured remote administration tools are a common attack vector, security experts say.
- The RSA breach: One year later by Marcia Savage
A framework for big data security
by John Kindervag, Contributor
Organizations are entranced with big data but need to acknowledge the security risks and plan accordingly.
Lessons learned from VeriSign, Symantec breaches
by Marcia Savage
After a string of breaches at major security vendors, whom can we trust?
- A framework for big data security by John Kindervag, Contributor
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...