By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
SIEM, log management and big data security analytics News
July 12, 2017
In this week's Risk & Repeat podcast, SearchSecurity editors discuss the identity and access management industry and how machine learning algorithms could govern IAM systems.
June 22, 2017
Machine learning in cybersecurity applications for identity management systems are becoming more common today. But will algorithms be the best option for authenticating and authorizing users?
April 21, 2017
Juniper's Kevin Walker talks with SearchSecurity about his company's Software-Defined Secure Network platform, improving SDN security, and the evolution of machine learning.
November 30, 2016
A sharp rise in cloud file sharing and collaboration activity is creating big problems for security teams – even when the number of security incidents is miniscule.
SIEM, log management and big data security analytics Get Started
Bring yourself up to speed with our introductory content
The current trend in SIEM systems involves machine learning capabilties. Even so, direct human management is still essential for SIEM to be effective. Continue Reading
The drive for greater security fuels IT more than ever, but fighting infosec threats depends on locating the right data sets and analyzing them efficiently. Continue Reading
Threat analysis tools need to be in top form to counter a deluge of deadly security issues. Here are tips for getting the most from your analytics tool. Continue Reading
Evaluate SIEM, log management and big data security analytics Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Google is using machine learning and peer group analysis to protect against malicious Android apps in the Google Play Store. Matt Pascucci explains how this works. Continue Reading
Can Structured Threat Information eXpression improve threat intelligence sharing? Nick Lewis breaks down the evolution of the STIX security framework. Continue Reading
On the hunt for the best SIEM tool for your company? Learn how to evaluate the capabilties of the newest security information and event management products. Continue Reading
Manage SIEM, log management and big data security analytics
Learn to apply best practices and optimize your operations.
VMware added vRealize Log Insight NSX in version 6.2.3. This central logging system receives log entries from ESXi hosts and helps identify issues in your NSX deployment. Continue Reading
Advances in machine learning technology and artificial intelligence have proven to work well for some information security tasks such as malware detection. What's coming next? Continue Reading
Cloud logs of security events produce an abundance of data. Expert Dave Shackleford discusses how to filter through it and get to the important security events. Continue Reading
Problem Solve SIEM, log management and big data security analytics Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Why nation-state attribution plays a major role in the U.S. government's willingness to share cyberthreat intelligence with private-sector companies. Continue Reading
Machine learning in security is continuing to advance, and many companies now claim to have introduced artificial intelligence techniques into their platforms. With the high volume of data that most security teams have to prioritize, machine ... Continue Reading
Enterprises with open FTP servers are being targeted by Miner-C malware for crypto coin mining activities. Expert Nick Lewis explains how enterprises can protect their servers. Continue Reading