PRO+ Premium Content/Information Security magazine
Access your Pro+ Content below.
Continuous monitoring program demystified

For many security teams, "continuous monitoring" is a vague concept associated with FISMA compliance. A continuous monitoring program can be simple or complex, depending on your technology, budget, and compliance and security requirements. Even for enterprises that fall outside of the 2012 FISMA mandate, continuous monitoring is still worth the investment, says Dave Shackleford, who explains the technology and implementation in this month's cover story.
Adam Rice looks at the advanced persistent threat (APT) and its role in the collection part of the classic intelligence cycle. Find out what happens once an APT campaign begins and how the elevation of APT techniques and tools is changing enterprise security tactics. The chief information security officer's role sparks heated debate. How has the job changed as a steady stream of household name companies face brand-damaging data breaches?
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
Features in this issue
-
Beyond the Page: Continuous monitoring for network security
Dave Shackleford brings you up to speed on what you need to know about continuous monitoring for network security.
-
Continuous monitoring demystified
A continuous monitoring program can improve everything from configuration and patch management to event monitoring and incident response.
-
Has the CISO role changed under the spotlight?
The career is only now defining itself.
Columns in this issue
-
CISO job compensation tied to reporting channels
Time to move higher up the chain of command (into the line of fire).
-
What do we need to make IoT security a reality?
As standards and security models emerge, security professionals can take steps today to improve Internet of Things security.
-
Buyer's Handbook
Finding a secure managed file transfer tool: Key considerations
Download -
E-Handbook
What's new in private cloud management?
Download -
E-Handbook
21st century data security model: Can tech save us from ourselves?
Download -
Buyer's Handbook
Botnet attacks are evolving; your defenses must too
Download