Blog Posts Tagged with "Network Security Monitoring"
Logging: Opening Pandora's Box - Part 2 - Elation
May 10, 2012 Added by:Rafal Los
Once you get over the anxiety of logging, a wave of elation generally hits. Whether you're getting excited about being able to catch evil-doers in the act, or the capability to notice system failures before they happen logging can save your skin more than you'd think...
Comments (0)
Logging: Opening Pandora's Box - Part 1 - Anxiety
May 09, 2012 Added by:Rafal Los
You're probably worried that log analysis is going to consume all of your time, or you'll find out that your organization has been pwn3d for years and all your data has been exfiltrated in real-time and your latest database is being copied off to China... aren't you?
Comments (0)
Smart Grid Security, Challenges and Change
May 08, 2012 Added by:Larry Karisny
The cost and time of trying to become compliant with guidelines and standards will put smart-grid security years off before it can achieve any security solutions. There must be a way out of what people in the security business are now calling the "smart grid security circus"...
Comments (0)
Network Anomaly Detection Takes a NAP
May 07, 2012 Added by:Marc Quibell
ADS are still used for investigative purposes - after the data has passed - taking correlated log data and running an analysis against historical data to see if anything abnormal happened. Well that's cool, except it already happened - the damage is already done in most cases...
Comments (1)
ICS-CERT: Event Auditing and Log Management
April 30, 2012 Added by:Infosec Island Admin
Without properly configured auditing and logging practices, incident response teams often find it difficult to determine the significance of a cybersecurity event. ICS-CERT has provided a collection of resources to assist vendor and asset-owner security teams...
Comments (0)
Outsourcing SIEM and Log Analysis
April 29, 2012 Added by:Marc Quibell
What are the risks of MSSPs managing the detection and analysis of network activity data for your company? There are some events that, if detected early, may avert lawsuits, data breaches and other embarrassing or career-ending moments for a company...
Comments (4)
Wait, What? Someone Has to Look at Those Logs?
April 26, 2012 Added by:Jack Daniel
Monitoring the performance of your MSSP is cheap insurance- the last thing you want to face is a failure of your service and the need to rebuild an in-house program. You thought getting all that data pushed out to the MSSP was a pain- just imagine trying to get it back...
Comments (1)
Tearing Away the Veil of Hype from Palo Alto Networks’ IPO
April 24, 2012 Added by:Richard Stiennon
At long last the much hyped Palo Alto Networks (PAN) has filed its S-1 in preparation for an IPO. Now that we have some visibility into PAN’s real finances it is time to address some of their claims, and perhaps throw cold water on the exuberance being expressed in some circles...
Comments (0)
CIOs and Securing Data with Analytics
April 19, 2012 Added by:Bill Gerneglia
This expanding rate of potential threats call for a new way to approach corporate data security. The latest approach is one that is based on intelligence and BI tools. Security intelligence applies advanced analytics and automation technology to the collection of information from hundreds of sources across an organization...
Comments (1)
CISSP Reloaded Domain Six: Operations Security
April 18, 2012 Added by:Javvad Malik
Some argue that operations security is primarily focused around IT and bring up the old argument of IT vs infosec and the baggage that comes along with that. It’s an argument as old as whether PC’s are better than Macs, Ninja’s could beat Pirates or Cagney was better than Lacey...
Comments (0)
Reducing the Cost of Visibility with Unified Security Management
April 09, 2012 Added by:Infosec Island Admin
Webinar: Thursday, April 19, 2012 12:00 PM - 1:00 PM EST - Beyond improving your basic defenses, understand how unifying security management can maintain compliance and provide visibility into your infrastructure at a lower cost than traditional approaches...
Comments (0)
LIGHTS Webinar: Cybersecurity Across Critical Infrastructures
April 08, 2012 Added by:Chris Blask
LIGHTS is a private-private non-profit partnership which provides a collaborative space to promote cybersecurity situational awareness across critical infrastructures. The goal of LIGHTS is to increase visibility into threats by making security monitoring ubiquitous...
Comments (0)
Beyond the Firewall – Data Loss Prevention
April 05, 2012 Added by:Danny Lieberman
It doesn’t matter how they break into your network or servers – if attackers can’t take out your data, you’ve mitigated the threat. This paper reviews the taxonomies of advanced content flow monitoring that is used to audit activity and protect data inside the network...
Comments (0)
New Release of COREvidence Multi-Engine Vulnerability Service at RSA Conference
March 29, 2012 Added by:Nabil Ouchn
This newest release comes with a bunch of new features and concepts. The dashboard has been designated to display clear and specific data for our users. At a glance customers can determine the assets with the least secure status. All relevant information is at your fingertips...
Comments (0)
Howard Schmidt on Federal Cyber Security Priorities
March 27, 2012 Added by:Headlines
"Federal Departments and Agencies must defend their information systems in a resource-constrained environment, balancing system security and survivability while meeting numerous operational requirements requires robust risk management," said Schmidt...
Comments (0)
Experts Tell Senate that Critical Networks are Compromised
March 22, 2012 Added by:Headlines
"I think we've got the wrong mental model here. We've got to go to a model where we assume our adversary is in our networks, on our machines, and we've got to operate anyway, we've got to protect the data anyway," said Sandia National Laboratory's James Peery....
Comments (0)
- GitHub Hires Former Cisco Executive Mike Hanley as Chief Security Officer
- Reddit Names Allison Miller as Chief Information Security Officer (CISO)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps