Email Alerts
-
How to use the free eEye Retina scanner community edition
In this screencast, learn how to use the free community edition of the eEye Retina scanner. Tip
-
Incident response security plans for advanced persistent threat
Dealing with advanced persistent threat (APT) presents unique challenges. Learn how an incident repsonse program can save your enterprise from APT. Tip
-
McAfee update problem: Dealing with bad antivirus DAT files
While buggy antivirus DAT files are the exception rather than the rule, downloading them can cause just as much turmoil as a potential DDoS attack. In this tip from expert Ernie Hayden, learn how to prepare your enterprise network for any sort of maj... Tip
-
Create a data breach response plan in 10 easy steps
Having a solid data breach response plan in place can make the threat of a security breach less intimidating. In this tip, learn 10 steps to take that will lead to an effective data breach response plan. Tip
-
Defining an incident response process when short staffed
The incident response process can be difficult when short staffed. In this tip, learn how to put together a computer security incident response team by leveraging other departments in your organization. Tip
-
Creating a proactive enterprise security incident response program
Every organization should develop a proactive security incident response program to ensure that when an incident does occur, it can be handled quickly and efficiently. Contributor Marcos Christodonte II explains how. Tip
-
Forensic incident response: Integrating a SIM system and an IAM system
SIM systems and identity management systems are designed to operate independently; by understanding where each technology's integration points are and how to maintain their effectiveness once they're joined, it's possible to create a more effective i... Tip
-
How to examine a DD image on Windows or Linux
A slew of open source and commercial tools will help you examine a DD image on either Windows or Linux. Tip
-
How to create a bit-image copy of a live server
Part of your incident response plan should include the creation of a bit image copy of a live server. Free and open source tools are available to simplify this process. Tip
-
Security book chapter: Applied Security Visualization
In this section of Chapter 5: Visual Security Analysis (.pdf), author Raffael Marty discovers the forensic analysis of log data for discovering attacks and reporting incidents. Tip
Security Management Strategies for the CIO