Data Analysis and Classification News
October 09, 2015
News roundup: The EU Court has invalidated the Safe Harbor agreement, leaving companies scrambling to deal with overseas data transfers securely. Plus: SHA-1 collision attack; NIST email security initiatives; worry over cyberthreats.
August 25, 2015
Video: Threat intelligence tools are a growing market and enterprises need to be able to see through the hype to get the best product for them.
May 21, 2015
A new study shows enterprises with security analytics are confident in their threat detection capabilities, while those without are overwhelmed by copious false positives and alerts.
May 19, 2015
Network security vendor Fortinet and DHS signed an agreement on security information sharing for better cyber protection in the public and private sectors.
Data Analysis and Classification Get Started
Bring yourself up to speed with our introductory content
Security teams need to practice and test data analysis, but it can be challenging to do in small environments. Expert Frank Siemons explains some ways to make it work anyway. Continue Reading
Expert Dan Sullivan explains what big data security analytics is and how these tools are applied to security monitoring to enable broader and more in-depth event analysis for better enterprise protection. Continue Reading
User behavior analytics is emerging as a technology to prevent malware infections and end-user attacks, but how viable is it? Expert Nick Lewis outlines the pros and cons. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Data Analysis and Classification Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert Dan Sullivan examines the Lancope StealthWatch FlowCollector, a security analytics product that ingests large volumes of data to identify suspicious activity. Continue Reading
Expert Dan Sullivan takes a look at the FireEye Threat Analytics Platform, a cloud-based security analytics product that offers threat detection and contextual intelligence. Continue Reading
Expert Dan Sullivan checks out Hexis Cyber Solutions' NetBeat MON, a security analytics monitoring appliance that leverages several open source network monitoring tools. Continue Reading
Manage Data Analysis and Classification
Learn to apply best practices and optimize your operations.
HIPAA data breach reporting now uses an electronic Web portal, so what does this mean for covered entities? Expert Mike Chapple explains. Continue Reading
How do they know it’s really you? New behavioral technologies use data science to monitor user activity within the network. Continue Reading
The data science that reprogrammed Wall St. trading models may offer lessons for security. Continue Reading
Problem Solve Data Analysis and Classification Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The best data-classification programs are simple and easy to use. Expert Mike Chapple outlines his four must-have data-classification categories. Continue Reading
To overcome network security issues from advanced attackers and BYOD, security professionals are turning to network flow analysis to gain improved network security visibility. Continue Reading
In this Ask the Expert video, Ernie Hayden answers the question of what 'big data' is and outlines big data security issues in this video. Continue Reading