Email Alerts
-
computer forensics (cyber forensics)
Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. Definition
-
Improving security management processes with SIEM
This Security School will explain the best means for an organization to effectively analyze SIM data, how to improve SIM collection, set reasonable goals for these tools and how to get the best data in order to improve incident response, change manag... partOfGuideSeries
-
Audit log security: How to monitor and protect audit logs
Is it possible to make audit logs tamper-proof? Expert Matthew Pascucci offers best practices for audit log security and monitoring. Answer
-
Should syslog format be mandatory in a log management product?
Matt Pascucci discusses what to look for when evaluating a log management product and whether syslog format should be a requirement. Answer
-
What to look for in full-packet-capture and network forensic tools
Matt Pascucci explains what to look for in full-packet-capture network logging and network forensic tools, and areas to focus on during the search. Answer
-
Why advanced malware detection is key to cut through 'network noise'
Video: Wolfgang Kandek, CTO at Qualys, discusses the need for advanced malware detection as true enterprise threats are being lost in "network noise." Video
-
Martin Roesch remembers John Burris; details new Sourcefire products
Video: Interim CEO Martin Roesch pays tribute to late CEO John Burris and discusses new Sourcefire products, including its incident response service. Video
-
Conducting APT detection when Elirks, other backdoors hide traffic
Is it possible to detect APT attacks when malicious traffic is hidden? Expert Nick Lewis details how the Elirks backdoor connection hides APT traffic. Answer
-
Amit Yoran on 'big data' security analytics, threat intelligence
Amit Yoran of RSA NetWitness discusses 'big data' security analytics, threat intelligence and network security monitoring with News Director Rob Westervelt. Video
-
Marcus Ranum chat: Network threat detection and wireless attacks
Security expert and Information Security magazine columnist goes one-on-one with Aaron Turner, co-founder of security consulting firm N4Struct. Column
Security Management Strategies for the CIO