Real time network monitoring and forensics
- February 06, 2020
Network security vendor Forescout Technologies was acquired for $1.9 billion by Advent International, a private equity firm looking to increase its cybersecurity investments.
- September 05, 2019
The new feature is meant to enable companies to identify attackers faster. Other updates to the security system include extending cloud capabilities to Amazon Web Services.
- August 14, 2019
Defending against the rising number and increasing sophistication of IoT botnet attacks isn't an easy task. Learn about the latest threats and the techniques to mitigate them.
- March 21, 2018
SAP CSO Justin Somaini discusses how SAP uses machine learning for security tasks, like anomaly detection, and compares supervised and unsupervised algorithms.
- February 22, 2017
In this episode of SearchSecurity's Risk & Repeat podcast, editors recap RSA Conference 2017 and discuss how the show addressed many security problems, but had very few answers.
- February 17, 2017
At RSAC, former Tor Project CEO Andrew Lewman explains the latest research into darknet technology and how that tech continues to evolve as an attack vector.
- February 10, 2017
Corero Network Security's Dave Larson talks with SearchSecurity about how DDoS defense has changed and why telecom service providers have struggled to keep up with new threats.
- February 07, 2017
Corero Network Security's Dave Larson talks with SearchSecurity about how the Mirai botnet attacks have forced companies to change their DDoS mitigation strategy.
- July 08, 2016
In a move to support the development of global cybersecurity norms, Microsoft calls for improved cyber attribution to identify cyberattack perpetrators.
- May 27, 2016
RSA's Rashmi Knowles spoke with SearchCloudSecurity about enterprises struggling with security visibility, and how analytics and data science can help.
- May 12, 2015
Security software maker AlienVault scrambled to patch two of its products after a security researcher exposed longstanding vulnerabilities in them.
- April 29, 2015
As SSL traffic increases, so inevitably will the number of attacks using it to hide. A session at RSA Conference 2015 explained why hackers love SSL, and how enterprises can defend against them.
- December 18, 2014
According to WatchGuard, seven out of 10 restaurants, hotels and other businesses don't take the necessary steps to secure their guest Wi-Fi networks.
- November 12, 2014
Pain points related to finding indicators of compromise in system logs and CDE outsourcing have led to a pair of new PCI special interest groups that will begin work next year.
- October 27, 2014
Research from Nemertes shows an increasing percentage of enterprises are utilizing big data analytics for security as traditional defenses fail to hold off attackers.
- September 17, 2014
The defense-in-depth security model is often touted as a must for enterprises, but research shows that security products often fail to do what they're supposed to.
- February 07, 2014
Anomaly-based user activity monitoring is the only measure that can stop Target-like attacks that utilize stolen credentials, experts say.
- October 15, 2013
One research group says an enterprise IPS can't help detect APTs. But network security expert Brad Casey explains why that isn't necessarily true.
- September 05, 2013
Damballa is adding HTTP request profiling to its advanced threat protection platform to detect malware that bypasses traditional security approaches.
- May 21, 2013
New features for detecting and analyzing malware in Sourcefire's FireAMP and FirePOWER products supplement flagging signature-based antimalware.
- November 27, 2012
Security expert and Information Security magazine columnist goes one-on-one with Aaron Turner, co-founder of security consulting firm N4Struct.
- April 23, 2012
Attackers are already in the network, so if companies aren’t monitoring activity, they’re not doing enough, said Shawn Henry of CrowdStrike.
- February 08, 2012
Sourcefire CTO Marty Roesch introduced cloud-based analysis for threat intelligence gathering. Network security monitoring platforms like RSA NetWitness may be headed in a similar direction.
- November 01, 2011
Can security information and event management systems be the foundation for comprehensive IT data analytics? Powerful correlation engines and sharper analytical capabilities are forthcoming, analysts say.
- April 04, 2011
EMC said NetWitness will become a core element of RSA's security management products.
- January 31, 2011
Eddie Schwartz, CSO of network analysis firm NetWitness, talks about targeted malware in the wake of Stuxnet and the company's new Spectrum malware analysis platform.
- May 04, 2010
Some network administrators fear too many security features can cause bottlenecks, slowing the network or worse, shutting it down altogether.
- April 27, 2010
Ongoing network security initiatives at the federal level, including the Trusted Internet Connections program and the Einstein project are helping provide a roadmap for the private sector, according to a network security expert. Michael Markulec, ...
- November 10, 2009
Cybercriminals turn to cloud computing to feed commands to the throngs of zombie computers under their control and avoid detection.
- October 19, 2009
Government agencies were among the first to retain mountains of network traffic data, but large banks, financial firms and healthcare companies are following in an effort to respond to alerts generated by intrusion defense systems and speed digital ...
- December 02, 2008
IxDefend from Ixia addresses network device and application flaws by fuzzing them to expose flaws and trigger problems.
- August 30, 2007
The Silicon Valley Regional Computer Forensics Laboratory pulls together evidence necessary to make a case in court.
- May 23, 2007
Sourcefire and Insecure.org have inked an agreement to develop open source vulnerability scanning tools based on Insecure's Nmap scripting engine.
- April 04, 2007
AT&T is now offering business customers a network-based security service that provides Web content and instant messaging filtering. Analysts say it's a step in the right direction.
- June 05, 2006
The San Diego Supercomputer Center has had only one compromise in nearly six years, without using a firewall. The SDSC's security manager explains how.
- June 02, 2005
IT managers use SSH to gain secure access to remote computers. Hackers are using it to crack your network, with help from their zombie friends.
- January 10, 2005
Computer forensics offers a surprising amount of help to investigators.
- December 16, 2004
Developers of the popular open-source tool are starting to charge commercial customers who bring nothing to the project's development.
- June 01, 2004
To secure data outputs, some organizations are going a step further by deploying data protection systems for specific applications.
- June 01, 2004
Log analysis is the most under-appreciated, unsexy aspect of infosecurity, yet Marcus Ranum says it's one of the most important.
- December 09, 2003
Employee monitoring can help protect intellectual property and keep an eye on employee activities, if it's done properly. What are some of the most common mistakes of monitoring? Why should companies employ a monitoring plan? In this interview, ...
- November 04, 2003
Computer forensics isn't just a Hollywood invention. More businesses are relying on it to find incriminating evidence against employees.
- June 25, 2003
Who's Who in Infosec is an ongoing series featuring profiles of security professionals and their contributions to the industry.
- March 20, 2003
There is definitely a pantheon of open-source products that enterprises have embraced, including Linux, Apache and Sendmail. But what about open-source antivirus software? The OpenAntiVirus Project is trying to fill that gap. The group hopes the ...
- February 25, 2003
Security services provider Red Siren has updated its network infrastructure security checklist, a collection of best practices for network administrators and chief security officers.
- December 18, 2002
In the SearchSecurity.com on-demand Webcast Network Security Monitoring, speakers Richard Bejtlich, senior forensic consultant for Foundstone and Robert Visscher, lead network security ...