SIEM log management and big data security analytics
- August 04, 2006
Product review: Information Security magazine's Joel Snyder says Check Point's vendor-agnostic Eventia Analyzer 2.0/Eventia Reporter is worth consideration despite limited BI options.
- July 20, 2006
Meanwhile, Metasploit creator H.D. Moore warns of a serious Internet Explorer flaw and Cisco may get more unwanted attention at the upcoming Black Hat conference.
- May 03, 2006
Hot Pick: SIMs are maturing to a level where they are practical and effective, and Q1 Labs has moved to the forefront with its innovative QRadar 5.0.
- March 17, 2006
This week bloggers worried about banks losing their grip on data, and the many ways criminals can take advantage of credit card insecurity.
- February 02, 2006
IT pros say enterprises have a good chance of weathering Nyxem's wrath Friday because of the ample warning and timely action from AV firms. But don't exhale just yet.
- January 19, 2006
Flaws in IOS and CallManager could be exploited to escalate administrative privileges and cause a denial of service. Meanwhile, exploit code targets Veritas NetBackup.
- June 29, 2005
The latest version of TriGeo's Security Information Manager is a highly flexible, easy-to-manage appliance that's designed to support 50 to 5,000 active devices.
- June 01, 2004
Log analysis is the most under-appreciated, unsexy aspect of infosecurity, yet Marcus Ranum says it's one of the most important.
- March 17, 2003
Enterprises need to manage every facet of their IT security operation, including making assessments of risks and threats and determining who has access to what data and applications necessary to do their jobs. Computer Associates' eTrust solutions ...
- March 02, 2001 02 Mar'01