Get Proactive About Managing Security and Risk
Compliance and financial risk used to be the driving concerns for security and risk management. Read how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.
Need for Speed: Streamlining Response and Reaction to Attacks
Today’s faster, newer and greatly improved malicious user requires a faster, newer and greatly improved response. Smarter attackers require more intelligent countermeasures, including faster and more reliable analysis, to react to security issues.
The Economic Impact of Cybercrime and Cyber Espionage
Cybercrime and cyberespionage cost the world millions and even billions of dollars annually. Add to that loss of confidential data and intellectual property, business disruptions, reputation damage, and the cost of securing networks and systems. In addition to the financial costs, malicious cyberactivities have larger ramifications on the social fabric of our society, such slowing
Doing Battle with Advanced Malware (Webtorials Report)
Enterprises need to balance their investment in security tools across all treat vectors—breach detection tools first, then tools to halt malware operation, then ones that clean up network infection. Traditional network security solutions should be integrated with newer, dedicated malware analysis and remediation solutions. The ideal state is a portfolio of tools working in tandem
Advanced Malware: Nowhere to Hide with a Layered Defense Strategy
Most organizations are finding out that single-tier security solutions can’t keep up with insidious advanced malware. What’s needed is a more sophisticated, intelligent, and comprehensive solution that detects, protects, and remediates. The most successful way to address advanced malware threats is through a layered solution that integrates multiple technologies and acts fast to attack the
Security Intelligence in Action: SANS Review of McAfee Enterprise Security Manager (ESM) 9.2
Most organizations, according to SANS, are using security event data to detect and track suspicious behavior, support forensic analysis, and gaining or proving regulatory requirements. But complicating these security goals is the growing number and sophistication of attacks. As the perennial arms-race between security and hackers continues, McAfee has the leverage enterprises need to keep
Log Management—The Foundation for Federal Security and Compliance
In this paper, we will explore the fundamental requirements for a sound log management solution and review some examples of less than optimum product deployments. Finally, we will examine what a US federal agency should be looking for in an extensible log management strategy, and propose a workable solution for tighter integration into and support
Needle in a Datastack: The Rise of Big Security Data
According to the report ‘Needle in a Datastack’, businesses are vulnerable to security breaches due to their inability to properly analyze or store big data. These ever-growing volumes of events, as well as asset, threat, user and other relevant data have created a big data challenge for security teams. To overcome this challenge, successful organizations
Security Management 2.5 – Replacing Your SIEM Yet?
This paper will walk you through the entire process — from soup to nuts — of evaluating, selecting, and deploying a SIEM. It offers pragmatic advice on how to get it done based on years working through this process as both consumers and vendors of SIEM technology. The process is not always painless, but we
SANS Institute: Correlating Event Data for Vulnerability Detection & Remediation
Learn how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies to provide context around application usage, user behaviors, and other operations — for better, more accurate reporting.