Security Event Management News
March 02, 2016
Bruce Schneier chats with SearchSecurity during lunch at RSAC about IBM's plans to acquire Resilient Systems to complete their security offering.
August 05, 2015
Data science can sort through huge data stores in order to find and stop advanced attackers and malware, but new methods are needed to make sure the machine learning keeps up with evolving threats.
May 12, 2015
Security software maker AlienVault scrambled to patch two of its products after a security researcher exposed longstanding vulnerabilities in them.
May 01, 2015
News roundup: Many believe the government should help avert cybersecurity woes, yet two House-approved cybersecurity bills are frowned upon. Plus: DDoS increase linked to IoT; Google password alert; 70% put networks at risk with undocumented changes.
Security Event Management Get Started
Bring yourself up to speed with our introductory content
Expert Dan Sullivan explains what big data security analytics is and how these tools are applied to security monitoring to enable broader and more in-depth event analysis for better enterprise protection. Continue Reading
Expert Karen Scarfone examines important criteria for evaluating security information and event management (SIEM) products for use by an organization. Continue Reading
Expert Karen Scarfone explains how nearly every organization can benefit from the insight that SIEM products provide. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Security Event Management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
SIEM emerged as a category in the mid-2000s. At that time, part of the rationale for SIEM products was that they could put the data winnowed from a large number of logs into a single pane of glass. This allowed for the summarization of that data and... Continue Reading
Learn what SIEM capabilities aid the real-time analysis of collected information and security alarms, allowing for prompt detection of actual or potential attacks. Continue Reading
More companies are investing in security information and event management to improve their response to targeted attacks, according to the readers we surveyed. Continue Reading
Manage Security Event Management
Learn to apply best practices and optimize your operations.
SIEM systems aren't infallible, so it's essential to effective SIEM analysis that it has an interface that eases security professionals' assessment and interpretation tasks. Continue Reading
Even basic SIEM analytics can get complicated. Learn three fundamental steps to take that will help you get the most out of your security information and event management tool. Continue Reading
A regular tabletop exercise could help to identify security risks in scenarios relevant to your organization. Expert Bob Wood explains the steps in the process. Continue Reading
Problem Solve Security Event Management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
False positive security alerts are troublesome, costly and time-consuming. Expert Kevin Beaver explains how to reduce the number of false positives Continue Reading
Faced with a deluge of security and log information, enterprises are overwhelmed by different types of data and finding it harder to respond to potential security events. Interest in security information and event management (SIEM) is increasing ... Continue Reading
One of today's top security infrastructure issues is learning how to achieve interoperability. Expert Kevin Beaver explains how to start down the right path. Continue Reading