Security Event Management News
March 02, 2016
Bruce Schneier chats with SearchSecurity during lunch at RSAC about IBM's plans to acquire Resilient Systems to complete their security offering.
August 05, 2015
Data science can sort through huge data stores in order to find and stop advanced attackers and malware, but new methods are needed to make sure the machine learning keeps up with evolving threats.
May 12, 2015
Security software maker AlienVault scrambled to patch two of its products after a security researcher exposed longstanding vulnerabilities in them.
May 01, 2015
News roundup: Many believe the government should help avert cybersecurity woes, yet two House-approved cybersecurity bills are frowned upon. Plus: DDoS increase linked to IoT; Google password alert; 70% put networks at risk with undocumented changes.
Security Event Management Get Started
Bring yourself up to speed with our introductory content
Expert Dan Sullivan explains what big data security analytics is and how these tools are applied to security monitoring to enable broader and more in-depth event analysis for better enterprise protection. Continue Reading
Expert Karen Scarfone examines important criteria for evaluating security information and event management (SIEM) products for use by an organization. Continue Reading
Expert Karen Scarfone explains how nearly every organization can benefit from the insight that SIEM products provide. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Security Event Management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
More companies are investing in security information and event management to improve their response to targeted attacks, according to the readers we surveyed. Continue Reading
Expert Dan Sullivan compares how the top-rated big data security analytics tools measure up against each other to help you select the right one for your organization. Continue Reading
Learn how to identify, evaluate and procure the top SIEM systems for your organization with this buyer's guide. Continue Reading
Manage Security Event Management
Learn to apply best practices and optimize your operations.
A regular tabletop exercise could help to identify security risks in scenarios relevant to your organization. Expert Bob Wood explains the steps in the process. Continue Reading
Robert Lemos looks at next-generation security information and event management analytic tools and cloud-based systems. Continue Reading
Combining data from a variety of sources with better analytics can reduce workloads. Continue Reading
Problem Solve Security Event Management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
False positive security alerts are troublesome, costly and time-consuming. Expert Kevin Beaver explains how to reduce the number of false positives Continue Reading
Faced with a deluge of security and log information, enterprises are overwhelmed by different types of data and finding it harder to respond to potential security events. Interest in security information and event management (SIEM) is increasing ... Continue Reading
One of today's top security infrastructure issues is learning how to achieve interoperability. Expert Kevin Beaver explains how to start down the right path. Continue Reading