Security Event Management News
November 30, 2016
A sharp rise in cloud file sharing and collaboration activity is creating big problems for security teams – even when the number of security incidents is miniscule.
March 02, 2016
Bruce Schneier chats with SearchSecurity during lunch at RSAC about IBM's plans to acquire Resilient Systems to complete their security offering.
August 05, 2015
Data science can sort through huge data stores in order to find and stop advanced attackers and malware, but new methods are needed to make sure the machine learning keeps up with evolving threats.
May 12, 2015
Security software maker AlienVault scrambled to patch two of its products after a security researcher exposed longstanding vulnerabilities in them.
Security Event Management Get Started
Bring yourself up to speed with our introductory content
The CISO (chief information security officer) is a senior-level executive responsible for developing and implementing an information security program, which includes procedures and policies designed to protect enterprise communications, systems and ... Continue Reading
Expert Dan Sullivan explains what big data security analytics is and how these tools are applied to security monitoring to enable broader and more in-depth event analysis for better enterprise protection. Continue Reading
Expert Karen Scarfone examines important criteria for evaluating security information and event management (SIEM) products for use by an organization. Continue Reading
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Evaluate Security Event Management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
ZCryptor ransomware can self-replicate through autorun files placed on removable storage devices. Expert Nick Lewis explains how your enterprise can mitigate this risk. Continue Reading
Expert Dan Sullivan takes a look at how the IBM QRadar Security Intelligence Platform collects data from multiple sources so as to provide a comprehensive view of IT security. Continue Reading
Expert Dan Sullivan examines LogRhythm's Security Analytics Platform, a product that leverages big data analytics and machine learning to help protect enterprises. Continue Reading
Manage Security Event Management
Learn to apply best practices and optimize your operations.
Cloud logs of security events produce an abundance of data. Expert Dave Shackleford discusses how to filter through it and get to the important security events. Continue Reading
The healthcare industry is a target for ransomware infections. Expert Ernie Hayden explains how organizations can take steps to prevent and respond to these attacks. Continue Reading
SIEM systems aren't infallible, so it's essential to effective SIEM analysis that it has an interface that eases security professionals' assessment and interpretation tasks. Continue Reading
Problem Solve Security Event Management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A privacy breach at ClixSense led to user account details being put up for sale. Expert Michael Cobb explains how companies should be held accountable for their security practices. Continue Reading
It's not possible to eradicate the risk of DoS attacks, but there are steps infosec pros can take to reduce their impact. Mike Chapple shares pointers on how to prevent DoS attacks. Continue Reading
False positive security alerts are troublesome, costly and time-consuming. Expert Kevin Beaver explains how to reduce the number of false positives Continue Reading