New & Notable
Information Security Incident Response-Detection and Analysis News
June 24, 2014
At its annual security confab, the research giant said enterprises buy too much threat prevention and not enough detection and response technology.
April 11, 2014
FireEye and Palo Alto Networks take issue with the new NSS Labs report on breach-detection systems, calling the review process into question.
March 25, 2014
Innovative threat detection products like FireEye and Damballa aren't being deployed inline and that lack of trust poses incident response challenges.
March 06, 2014
Speakers at RSA Conference 2014 said information security incident response teams must identify and prep key participants well before incidents occur.
Information Security Incident Response-Detection and Analysis Get Started
Bring yourself up to speed with our introductory content
Keith Barker of CBT Nuggets demonstrates how to use LOG Storm, a free log management system from BlackStratus that organizes and prioritizes enterprise log data. Continue Reading
Brad Casey highlights three DNS data-monitoring methods that can help organizations determine if their networks have been breached. Continue Reading
In this section of Chapter 5: Visual Security Analysis (.pdf), author Raffael Marty discovers the forensic analysis of log data for discovering attacks and reporting incidents. Continue Reading
Evaluate Information Security Incident Response-Detection and Analysis Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The next-generation network -- one that must encompass the cloud, mobility and Internet of Things devices -- requires a different standard of network monitoring tools. Learn about new and improved tools that conquer those challenges. Continue Reading
Incident response management is Co3's focus, says its recently appointed CTO and security expert Bruce Schneier. Continue Reading
Video: Keith Barker of CBT Nuggets shows how to use CrowdStrike's security incident response tool, CrowdResponse, to gather forensic information. Continue Reading
Manage Information Security Incident Response-Detection and Analysis
Learn to apply best practices and optimize your operations.
Video: SANS Institute's John Pescatore says though new evasion techniques are aiding advanced targeted attacks, defense matters as much as response. Continue Reading
In this excerpt from Linux Malware Incident Response, authors Cameron Malin, Eoghan Casey and James Aquilina discuss volatile data collection methodology, steps and preservation. Continue Reading
Practicing incident response for a DNS attack will help enterprises recover faster. Nick Lewis offers incident response planning best practices. Continue Reading
Problem Solve Information Security Incident Response-Detection and Analysis Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Discover what your enterprise should do to replace the Symantec Protection Center Enterprise platform as it reaches end of life. Continue Reading
Expert Nick Lewis provides advice for enterprises looking to take inspiration for an incident response plan from Facebook's red team exercises. Continue Reading
One research group says an enterprise IPS can't help detect APTs. But network security expert Brad Casey explains why that isn't necessarily true. Continue Reading