Intrusion detection News
January 12, 2017
A quiet AWS acquisition last year could improve customers' ability to detect and respond to cyberattacks at scale through automation and machine learning.
January 09, 2017
Truffle Hog utility roots out and detects text blobs with enough entropy to be secret keys -- even those buried deep in old Git repositories -- to prevent exploits.
December 15, 2016
A second Yahoo breach was disclosed, with more than 1 billion accounts compromised and users left at risk of further attacks for three years.
November 29, 2016
Ad fraud is a costly problem, but it's often overlooked. White Ops CEO Michael Tiffany talks with SearchSecurity about why it's time to address this cybercrime scheme.
Intrusion detection Get Started
Bring yourself up to speed with our introductory content
While the cloud may be flexible and cost-efficient, a lack of data safeguards and compliance standards makes security the largest hurdle to leap. Continue Reading
Learn the basics of runtime application self-protection and the key benefits and drawbacks to this approach to building security into applications as they execute. Continue Reading
Cisco combined the ASA series firewall with SourceFire's FirePOWER threat and malware detection capabilities. Expert Mike O. Villegas takes a closer look at this NGFW. Continue Reading
Evaluate Intrusion detection Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
In this excerpt from chapter Z of Information Security Analytics, authors Mark Ryan Talabis, Robert McPherson, Inez Miyamoto and Jason L. Martin discuss security intelligence. Continue Reading
See how security analytics tools can work for businesses looking for more from their security software, and what security analytics tools are right for certain business scenarios. Continue Reading
Researchers identified 110 malicious Tor HSDirs that were found snooping information. Expert Kevin Beaver discusses the takeaways from this research for enterprises. Continue Reading
Manage Intrusion detection
Learn to apply best practices and optimize your operations.
Almost 20 years after Citicorp decided to hire an executive-level security position dedicated to protecting its banking business, the responsibilities of the CISO job are still unclear to many business executives and open to discussion. Why do some companies still need convincing?
As threats and infrastructure evolve at a fast pace, chief information security officers have to remain proactive in the face of ongoing digitization and globalization. In this issue of Information Security magazine, we look at the role's elevation and influence on broader security and risk management initiatives. Most importantly, we highlight accomplishments of dedicated chief security officers from different industries -- entertainment, financial services, healthcare, retail and technology -- and get their views on challenges in the CISO job and changes ahead.
"The CISO has evolved from a technical security role to that of a corporate executive with a risk management focus," says Tim Callahan, senior vice president of global security and CISO at Aflac.
Strategic security is an increasing responsibility of the CISO job. A growing number of security officers have implemented a threat intelligence capability to help steer the technical aspects of their security program. We talk to CISOs and other security experts about some lessons they've learned -- sometimes the hard way -- as they lead these efforts. The CISO job is tough, but those who are up to the challenge find great rewards.Continue Reading
Cybersecurity defense in depth needs to learn from the military strategy it originated from. Expert Peter Sullivan explains where cybersecurity should not deviate. Continue Reading
Governance, risk and compliance processes face numerous complications in the digital age. Companies' data volumes continue to grow exponentially, while information security threats and regulatory mandates constantly evolve. Digitization does have its GRC benefits, however. The vast amount of data stored by the average modern company presents a treasure trove of analytics information that can help prevent future security incidents and regulatory infractions. These GRC benefits extend to the rest of the business as well, potentially improving customer relations, streamlining resources and boosting the bottom line. In this handbook, learn how companies can draw business value from GRC analytics data and develop strategies to incorporate analytics best practices that will benefit company-wide business processes. Continue Reading
Problem Solve Intrusion detection Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Real-time behavioral threat analytics is the next frontier in security. Learn how a behavioral threat assessment tool can protect your enterprise systems and data. Continue Reading
Auto-rooting app LevelDropper has the ability to silently root devices and gain system level privileges. Expert Michael Cobb explains how to detect and stop it. Continue Reading
In this excerpt of Detecting and Combating Malicious Email, authors Julie JCH Ryan and Cade Kamachi discuss the elements of an email structure and touch on how attackers can use these elements to trick unwitting victims. Continue Reading