Continuous security monitoring: Learning from the Feds

Monitoring Network Traffic and Network Forensics

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Screencast: Using Nessus to scan for vulnerabilities

    Peter Giannoulis of Bones Consulting demonstrates how Nessus can be used as a vulnerability assessment tool that enterprises can use to help protect critical systems and networks. 

  • Web scanning and reporting best practices

    Implementing a solid Web scanning routine is a key way to avoid corporate Web application attacks. And with industry requirements such as PCI DSS, performing vulnerability scans are also required to stay compliant. In this tip, contributor Joel Dubin... 

  • Built-in Windows commands to determine if a system has been hacked

    In this tip, contributor Ed Skoudis identifies five of the most useful Windows command-line tools for machine analysis and discusses how they can assist administrators in determining if a machine has been hacked. 

  • The forensics mindset: Making life easier for investigators

    Eventually every enterprise suffers an incident, and a little preparation now can make all the difference when an event occurs. In this tip, contributor Mike Rothman explains why thinking like an investigator can help security pros develop a successf... 

  • vPro: Making the case for network security on a chip

    Intel's vPro technology promises hardware-based storage of network security credentials. But will having network security features stored on a chip make endpoint devices more secure? Stephen Cobb explains why products like vPro may soon be just as co... 

  • Getting the best bargain on network vulnerability scanning

    When it comes to enterprise network analysis, is it best to use a costly commercial vulnerability scanner or a less expensive open source product? In this week's tip, Mike Chapple explains which enterprise assets require the expensive stuff and which... 

  • Filtering log data: Looking for the needle in the haystack

    In this illustrated tip, network security expert David Strom demonstrates how to use a log-filtering tool to quickly make use of all those voluminous log files. 

  • Finding malware on your Windows box (using the command line)

    Security professionals typically overlook the Windows command line, instead spending their time with more complex GUI-based forensics tools. In this tip, Ed Skoudis explains how just a few command-line tricks can help users closely examine the config... 

  • Preparing for extrusion detection with a network traffic analysis

    Extrusion detection and prevention products can help companies proactively thwart internal data security breaches, but preparation is required before making a purchase. In this Data Protection Security School tip, Richard Bejtilch discusses the impor... 

  • Snort: A capable network intrusion prevention tool

    Most security practitioners have heard of the open source network intrusion detection system, Snort. For those who haven't, however, contributor Scott Sidel highlights the tool's ability to monitor traffic, log packets and analyze protocols. See how ...