Continuous security monitoring: Learning from the Feds

Monitoring Network Traffic and Network Forensics

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Lifecycle of a network security vulnerability

    In a chapter excerpt from Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century,author Ryan Trost reveals the full process of providing intrusion detection system coverage for a security vulnerability. 

  • Port scan attack prevention best practices

    While it's impossible to prevent against all port scanning attacks, there are best practices for port scanning security (such as a port scanning firewall) that can keep your network secure. Expert Mike Chapple weighs in. 

  • How to prevent network sniffing and eavesdropping

    Scenario: A hacker wants to glean data from two of your servers by installing network monitoring software. How can you prevent him from getting the data he wants? Learn more in this expert response. 

  • DoD urges less network anonymity, more PKI use

    U.S. Department of Defense CISO Robert Lentz went down a laundry list of security technologies needed to protect both private and government networks from cybercriminals. The age of anonymity on networks needs to come to a close to improve national c... 

  • Chained Exploits: How to prevent phishing attacks from corporate spies

    Ever wonder if someone is monitoring everywhere you go on the Internet? In this chapter excerpt from Chained Exploits: Advanced Hacking Attacks from Start to Finish, learn how to keep corporate spies at bay. 

  • PCI compliance requirement 10: Auditing

    Diana Kelley and Ed Moyle of Security Curve review PCI compliance requirement 10: "Track and monitor all access to network resources and cardholder data." 

  • An inside look at security log management forensics investigations

    David Strom provides some examples of log data that provided key clues to enterprise data breaches. 

  • How to analyze a TCP and UDP network traffic spike

    What does it mean when TCP and UDP network traffic spikes? Network security expert Mike Chapple explains what this means for enterprise network security management. 

  • How to perform a network forensic analysis and investigation

    Situation: A breach has occurred at your enterprise, and you need to gather relevant data, fast. What tools can you use to get the job done? In this expert response, Mike Chapple gives pointers on which network forensic analysis tools can help. 

  • The telltale signs of a network attack

    Some people believe that if IP addresses from China are attacking their network, then they are under attack from China. Expert John Strand explains why all that it is irrelevant.