By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Network threat detection News
April 21, 2017
Juniper's Kevin Walker talks with SearchSecurity about his company's Software-Defined Secure Network platform, improving SDN security, and the evolution of machine learning.
February 22, 2017
In this episode of SearchSecurity's Risk & Repeat podcast, editors recap RSA Conference 2017 and discuss how the show addressed many security problems, but had very few answers.
July 08, 2016
In a move to support the development of global cybersecurity norms, Microsoft calls for improved cyber attribution to identify cyberattack perpetrators.
March 02, 2016
Bruce Schneier chats with SearchSecurity during lunch at RSAC about IBM's plans to acquire Resilient Systems to complete their security offering.
Network threat detection Get Started
Bring yourself up to speed with our introductory content
As more companies promote machine learning and artificial intelligence technologies, chief information security officers need to ask some tough questions to get past the hype. Continue Reading
Advances in machine learning technology and artificial intelligence have proven to work well for some information security tasks such as malware detection. What's coming next? Continue Reading
The IT pro's job is to ensure the best network security network performance both. Our guide provides solid steps to take right now to achieve both in this age of mobile and the internet of things. Continue Reading
Evaluate Network threat detection Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
User behavior analytics can be used for a number of different objectives within an enterprise. Expert Ajay Kumar examines some of the most important features and capabilities. Continue Reading
Expert contributor Ed Tittel explains which types of organizations need threat intelligence tools as part of a proactive, layered security strategy to protect against threats. Continue Reading
User behavior analytics can be beneficial to enterprises, but there are complexities involved. Expert Ajay Kumar explains what companies should know about this new technology. Continue Reading
Manage Network threat detection
Learn to apply best practices and optimize your operations.
The healthcare industry is a target for ransomware infections. Expert Ernie Hayden explains how organizations can take steps to prevent and respond to these attacks. Continue Reading
Out-of-band management can be used for handling network infrastructure. Expert Judith Myerson explains the benefits of out-of-band management and how it can be implemented. Continue Reading
Network security alerts are high in number and low in accuracy. Expert Kevin Beaver explains strategies security professionals can develop to overcome these obstacles to improving security. Continue Reading
Problem Solve Network threat detection Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The PoisonTap exploit can bypass password locks on computers, enabling an attacker to remotely control systems. Expert Nick Lewis explains how the attack works. Continue Reading
A flaw that allows attackers to load malicious DLL files in Symantec products was labeled as severe. Expert Michael Cobb explains the vulnerability and its classification. Continue Reading
Why nation-state attribution plays a major role in the U.S. government's willingness to share cyberthreat intelligence with private-sector companies. Continue Reading