Please turn on your JavaScript for this page to function normally.
collaboration
Keys to successful security vendor collaboration

The IT manager tasked with understanding today’s complex vendor landscape is in an unenviable position. The rapid proliferation of new types of cyber security threats and …

box
Rethink network security outside the box

Preventing bad guys from compromising an organization has historically been executed based on a basic concept: establish a perimeter, and control who and what goes in and out. …

Keyboard
Upcoming trends in the SIEM market

AccelOps identified the need for a convergence of today’s disparate Network Operations Center (NOC) and Security Operations Center (SOC) departments, a shift to …

Proactive real-time security intelligence: Moving beyond conventional SIEM

Surprisingly, discussions about security intelligence still focus primarily around conventional reactive Security Incident and Event Management systems (SIEM). However, in …

The slow death of static security detections: Beginning of SIEM deployments

Machines both mechanical and electric have always been good at counting things. Ask anyone from an earlier generation who still uses a Victor Champion adding machine from the …

RSA Security Analytics
Adding context to security data to achieve visibility into attacks

At RSA Conference 2015, RSA announced new capabilities have been added to its Security Analytics solution, which is engineered to give organizations the necessary context to …

Fox-IT launches cyberthreat management platform

Fox-IT launched at RSA Conference 2015 in San Francisco its Cyberthreat Management Platform, a suite of solutions, integration tools and expert services designed to provide …

Four advantages of an identity behavior-based approach to cybersecurity

With an ever-increasing number of data breaches, more money is being poured into IT security budgets. According to Gartner, the average global security budget increased 8 …

Critical factors in preventing data breaches

McAfee issued a new report that assesses organizations’ abilities to detect and deflect targeted attacks, reveals the top eight most critical indicators of attack, and …

SIEM doesn’t reduce security incidents, say IT pros

A survey of IT professional has shown that most organisations don’t audit their IT infrastructures and those that do don’t have complete details of who changed …

Exabeam announces user behavior security technology

Exabeam launched its platform, which adds a layer of user behavior intelligence on top of existing SIEM and log management repositories to give IT security teams a view of the …

Continuous monitoring for enterprise incident response

Qualys has further bolstered its Continuous Monitoring (CM) cloud service. The latest features include automated alerts for changes in perimeter IP addresses, as well as a new …

Don't miss

Cybersecurity news