Information Security Incident Response-Detection and Analysis News
February 13, 2015
News roundup: While data sharing can boost intelligence and improve security, recent events show the benefits don't always outweigh the pitfalls. Plus: Chip-enabled POS systems coming quickly; MongoDB databases exposed; sophisticated phishing scams.
November 14, 2014
News roundup: A recent study revealed IT pros' confidence in implementing basic security measures is high, contradicting data that enterprises consistently fail to thwart basic attacks. Plus: BrowserStack hack lessons; responsible phishing reporting...
June 24, 2014
At its annual security confab, the research giant said enterprises buy too much threat prevention and not enough detection and response technology.
April 11, 2014
FireEye and Palo Alto Networks take issue with the new NSS Labs report on breach-detection systems, calling the review process into question.
Information Security Incident Response-Detection and Analysis Get Started
Bring yourself up to speed with our introductory content
Following the Sony Pictures hack, several of the company's network security shortcomings were revealed. Expert Kevin Beaver explains how better network security may have prevented the extent of the breach. Continue Reading
One of today's top security infrastructure issues is learning how to achieve interoperability. Expert Kevin Beaver explains how to start down the right path. Continue Reading
The rapid evolution of networks has created a number of challenges for security admins, especially when it comes to network security audits. Expert Kevin Beaver offers pointers on performing a next-gen network security audit. Continue Reading
Evaluate Information Security Incident Response-Detection and Analysis Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert Nick Lewis discusses the Cyber Incident Response Assistance certification from the NSA's National Security Cyber Assistance Program and what the accreditation means for an enterprise. Continue Reading
Shellshock had a tremendous impact on network security, affecting many popular vendors and products. Expert Kevin Beaver discusses what Shellshock means to network security, and the lessons that can be learned from the vulnerability. Continue Reading
The next-generation network -- one that must encompass the cloud, mobility and Internet of Things devices -- requires a different standard of network monitoring tools. Learn about new and improved tools that conquer those challenges. Continue Reading
Product ReviewsPowered by IT Central Station
The FortiGate security appliances. UTM security in a single device, good administrative interface and performances.Powered by IT Central Station
First things first Talking about FortiGate from Fortinet we are talking about a family of UTM (Unified Threat Management) appliances. This...Continue Reading
It makes the discovery of applications and classification of user traffic simple but I'd like to see a roadmap for SSL decryption.Powered by IT Central Station
Valuable Features: I'm most impressed with the visibility and control SourceFire solutions provide in to the types of traffic flowing in and out...Continue Reading
For price criteria, Fortinet wins over competitors. That being said, certain areas of the product need improvementPowered by IT Central Station
Valuable Features: <ul> <li>Performances</li> <li>VDOM</li> <li>UTM</li> <li>Consolidated...Continue Reading
Manage Information Security Incident Response-Detection and Analysis
Learn to apply best practices and optimize your operations.
Video: Tenable's Marcus Ranum says even if a security incident doesn't go as planned, simulating incidents with tabletop exercises can save time and money during an incident response process. Continue Reading
Video: SANS Institute's John Pescatore says though new evasion techniques are aiding advanced targeted attacks, defense matters as much as response. Continue Reading
In this excerpt from Linux Malware Incident Response, authors Cameron Malin, Eoghan Casey and James Aquilina discuss volatile data collection methodology, steps and preservation. Continue Reading
Problem Solve Information Security Incident Response-Detection and Analysis Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Hackers are infiltrating the enterprise through multifunction printers. Expert Kevin Beaver explains how to mitigate the threat and improve printer security. Continue Reading
Ensuring the security of a content delivery network can be a tricky task. Network security expert Kevin Beaver offers pointers for preventing CDNs from becoming compromised. Continue Reading
Discover what your enterprise should do to replace the Symantec Protection Center Enterprise platform as it reaches end of life. Continue Reading