Intrusion detection News
August 21, 2015
LightCyber formally launched the Channel Alliance Program, creating opportunities for MSPs to offer managed breach detection services; and other channel news.
August 07, 2015
Machine learning is better at detecting malware than systems that scan for known signatures. But researchers at Black Hat 2015 say adding a twist widens the performance gap even further.
July 06, 2015
Controversial Italian surveillance software firm, Hacking Team, was attacked, resulting in a 400 GB leak of sensitive data. The response from the Hacking Team was threatening, but may have been part of the attack.
June 11, 2015
As the focus of security moves to detection and response, a new product aims to find stolen corporate data within seconds or minutes of a data breach occurring by crawling the dark Web, but one expert questions the need for such a product.
Intrusion detection Get Started
Bring yourself up to speed with our introductory content
Expert Karen Scarfone examines security information and event management systems and explains why they are crucial for enterprise security. Continue Reading
A new tool claims to detect malware by monitoring power consumption -- but is it good for enterprise use? Enterprise threats expert Nick Lewis explains. Continue Reading
EINSTEIN monitors and analyzes Internet traffic when it moves in and out of U.S. federal computer networks. Continue Reading
Evaluate Intrusion detection Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert Michael Cobb explains what a smart sandbox is, how it differs from traditional sandbox technology, and when one should be considered for enterprise use. Continue Reading
The era of the Internet of Things, bring your own devices and social media has also become an era of highly sophisticated malware. Advanced security monitoring tools are crucial in the fight to protect the enterprise network.
This Insider Edition of Information Security offers the latest on these tools and how IT pros can best benefit from them. First, we review their newest capabilities, which include the ability to collect and scour immense amounts of data; some tools also have a capacity for learning. Next we talk to network security pros on the frontline, and how they are employing security monitoring tools. Finally, we examine the endpoint protection market, which was jolted back to life by demands for new levels of network protection in an era of smartphones and smartwatches.
This issue provides network and security IT pros with step-by-step guidance so they can decide what advanced security monitoring tools are right for their network’s particular needs. Continue Reading
Expert Nick Lewis explores the latest spam defense methods and products that will help enterprises defend against new and emerging spam techniques. Continue Reading
Manage Intrusion detection
Learn to apply best practices and optimize your operations.
The U.S. Postal Service suspended teleworking following a recent breach. Expert Kevin Beaver explains why teleworkers aren't always to blame in the event of a breach and explores methods for secure VPN access. Continue Reading
Advanced malware is stealthy and deadly. Learn how defend your network and data against it with tools that provide advanced malware detection capabilities. Continue Reading
Server-oriented malware is actually more likely to infect a virtual system than a physical one in many organizations. Now what? Continue Reading
Problem Solve Intrusion detection Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Unwanted preinstalled software -- also known as bloatware -- has made its way onto PCs and mobile devices alike. Expert Nick Lewis explains how to detect and uninstall the potential threat. Continue Reading
Malware that leaves no file on disk can throw enterprises' malware-detection capabilities for a loop. Learn how to detect and defend against fileless malware. Continue Reading
Move beyond prevention to fast detection to combat a stealthy social engineering attack. Continue Reading