New & Notable
Monitoring Network Traffic and Network Forensics News
November 12, 2014
Pain points related to finding indicators of compromise in system logs and CDE outsourcing have led to a pair of new PCI special interest groups that will begin work next year.
October 27, 2014
Research from Nemertes shows an increasing percentage of enterprises are utilizing big data analytics for security as traditional defenses fail to hold off attackers.
September 17, 2014
The defense-in-depth security model is often touted as a must for enterprises, but research shows that security products often fail to do what they're supposed to.
February 07, 2014
Anomaly-based user activity monitoring is the only measure that can stop Target-like attacks that utilize stolen credentials, experts say.
Monitoring Network Traffic and Network Forensics Get Started
Bring yourself up to speed with our introductory content
The rapid evolution of networks has created a number of challenges for security admins, especially when it comes to network security audits. Expert Kevin Beaver offers pointers on performing a next-gen network security audit. Continue Reading
Dave Shackleford brings you up to speed on what you need to know about continuous monitoring for network security. Continue Reading
Organizations pursue various approaches to continuous monitoring, but the first question is always what to monitor. Continue Reading
Evaluate Monitoring Network Traffic and Network Forensics Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
This Security School covers the latest in cloud security providers and in-house IaaS, outlining how enterprises can get the most out of both options. Continue Reading
New cloud logging and event management products and services are emerging to help enterprises transition assets to the cloud, however finding the proper tool can be a challenge. Dave Shackleford offers hints to ease the process. Continue Reading
A continuous monitoring program can improve everything from configuration and patch management to event monitoring and incident response. Continue Reading
Manage Monitoring Network Traffic and Network Forensics
Learn to apply best practices and optimize your operations.
Dr. Eric Cole explains how the use of crypto-free zones to prevent last-mile network encryption can thwart stealthy advanced attacks that often go undetected. Continue Reading
For many security teams, "continuous monitoring" is a vague concept associated with FISMA compliance. A continuous monitoring program can be simple or complex, depending on your technology, budget, and compliance and security requirements. Even for ... Continue Reading
The next-generation network -- one that must encompass the cloud, mobility and Internet of Things devices -- requires a different standard of network monitoring tools. Learn about new and improved tools that conquer those challenges. Continue Reading
Problem Solve Monitoring Network Traffic and Network Forensics Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Ensuring the security of a content delivery network can be a tricky task. Network security expert Kevin Beaver offers pointers for preventing CDNs from becoming compromised. Continue Reading
In this excerpt of Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides, the authors explain how to discover and extract malware from a Linux system. Continue Reading
In this excerpt of Introduction to Information Security: A Strategic-Based Approach, authors Timothy J. Shimeall and Jonathan M. Spring discuss the importance of intrusion detection and prevention. Continue Reading