Monitoring Network Traffic and Network Forensics
- November 12, 2014
Pain points related to finding indicators of compromise in system logs and CDE outsourcing have led to a pair of new PCI special interest groups that will begin work next year.
- October 27, 2014
Research from Nemertes shows an increasing percentage of enterprises are utilizing big data analytics for security as traditional defenses fail to hold off attackers.
- September 17, 2014
The defense-in-depth security model is often touted as a must for enterprises, but research shows that security products often fail to do what they're supposed to.
- February 07, 2014
Anomaly-based user activity monitoring is the only measure that can stop Target-like attacks that utilize stolen credentials, experts say.
- October 15, 2013
One research group says an enterprise IPS can't help detect APTs. But network security expert Brad Casey explains why that isn't necessarily true.
- September 05, 2013
Damballa is adding HTTP request profiling to its advanced threat protection platform to detect malware that bypasses traditional security approaches.
- May 21, 2013
New features for detecting and analyzing malware in Sourcefire's FireAMP and FirePOWER products supplement flagging signature-based antimalware.
- November 27, 2012
Security expert and Information Security magazine columnist goes one-on-one with Aaron Turner, co-founder of security consulting firm N4Struct.
- July 02, 2012
Network threat detection requires content monitoring and analysis, rather than solely relying on matching network packets to existing signatures.
- April 23, 2012
Attackers are already in the network, so if companies aren’t monitoring activity, they’re not doing enough, said Shawn Henry of CrowdStrike.