PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
March Volume 18 / No. 2

Incident response procedures speed discovery-response time

Many companies become aware of a security event but take hours or days to perform triage and finally remediate it. Incident response procedures can vary based on the organization, and the type of security incident, which could involve DDoS attacks, malware breach and containment or information disclosure. Emerging technologies in the areas of detection and response claim to remediate violations and monitor alerts, so overworked staff doesn't have to spend hours on a single event. Should security incident handling ever be automated or outsourced? We look at incident response procedures and technology advances to help enterprises with detection and response.

Enterprise-sponsored bug bounty programs continue to grow in popularity. Some companies have adopted invitation-only bug bounty programs, leading to a higher percentage of quality submissions than reported in public crowdsourcing programs. We explore the best ways to manage the risks involved with paying unknown researchers.

We continue our Readers' Top Picks series with a look at enterprise mobility management. EMM is not a monolithic product so much as an approach to managing and securing endpoints with mobile device management, mobile application management and more. Even application distribution, which is still new to many enterprises, garnered an impressive share as an important consideration among readers. We share the shortlist compiled from those who indicated plans to invest in EMM tools in the next 12 months.

Features in this issue

Columns in this issue

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

-ADS BY GOOGLE

Close