Intrusion detection News
March 25, 2014
Innovative threat detection products like FireEye and Damballa aren't being deployed inline and that lack of trust poses incident response challenges.
February 26, 2014
Even with a solid insider threat program in place, an RSA Conference 2014 speaker said good insider threat detection tools are key to success.
February 19, 2014
NSA data collection, metadata as surveillance and code names: The Data Mill reports.
October 03, 2013
McAfee introduces integrated advanced malware protection platform that lets companies quickly address malware intrusions.
Intrusion detection Get Started
Bring yourself up to speed with our introductory content
The forthcoming Google Chrome Canary browser boasts the ability to boost malware defense and prevent malware infection. Michael Cobb explains how. Continue Reading
When conventional security falls short, breach detection systems and other tier-two technologies can bolster your network’s defenses. Continue Reading
While the cloud may be flexible and cost-efficient, a lack of data safeguards and compliance standards makes security the largest hurdle to leap. Continue Reading
Evaluate Intrusion detection Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Readers vote on the top intrusion detection and prevention products in 2013: Network-based IDS and IPS appliances, attack traffic patterns. Continue Reading
The founder of the Honeynet Project explains how honeypots work and how they complement other technologies. Continue Reading
Manage Intrusion detection
Learn to apply best practices and optimize your operations.
Developing a continuous security monitoring program to ensure 24/7 security is no easy task. Michael Cobb offers key advice for completing the task. Continue Reading
The newly coined term 'advanced volatile threat' (AVT) describes a specific type of hard-to-detect attack. Nick Lewis debunks the AVT hype. Continue Reading
Expert Brad Casey explains why enterprises are turning to context-aware security approaches to improve their APT detection capabilities. Continue Reading
Problem Solve Intrusion detection Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Traditional security tools are no longer sufficient for defending against new breeds of attacks, forcing advanced threat-detection products to emerge. Continue Reading
To solve the breach-detection issues highlighted in the 2013 Verizon DBIR, several intrusion detection techniques are needed, says expert Nick Lewis. Continue Reading
SIEM struggles are common, but Mike Rothman explains why SIEM products are critical for advanced attack detection, and offers a SIEM tuning step-by-step. Continue Reading