Information Security Magazine - March 2010: Linking ‘Who’ and ‘What’
By: Information Security Magazine View more from Information Security Magazine >>
Download this next:
Checklist for attack surface management: 20+ key features
By: Ionix
Type: White Paper
What key features should an attack surface management (ASM) tool have?
This checklist maps out 20+ key capabilities and why they matter. These features concern:
- Discovery and attribution
- Risk assessment and prioritization
- Security operations
- Remediation and mitigation
- And more
To unlock insights that can guide your buying journey, tap into the 6-page checklist.
These are also closely related to: "Information Security Magazine - March 2010: Linking ‘Who’ and ‘What’"
-
How to Successfully Migrate to Elastic Security for SIEM
By: Elastic
Type: Product Overview
Adopting a security information and event management (SIEM) solution isn’t a trivial undertaking, and you’ll have an abundance of decisions to make along the way. Although, you don’t have to go it alone.
For organizations weighing their SIEM options, or who have already decided firmly on migrating to Elastic Security to shed restrictive licensing and lack of scalability from a previous solution, this reference guide is for you.
Access it here to gather a step-by-step approach for how to migrate to Elastic Security in the 41-page guide. Read it cover-to-cover or simply grab a copy to scan at your leisure.
-
SIM Technical Guide
By: TechTarget Security
Type: Ezine
Legacy security information and event management (SIEM) systems are difficult to deploy, costly to maintain, and inefficient to use. But what’s next? Upgrade? Augment? Rip and replace? Adopt services?
In this SearchSecurity.com Technical Guide on SIEMs, we explore the current state of SIEM systems in the enterprise today and take a look at how different organizations are approaching the next-gen SIEM. View now to learn more!
Sponsored by: IBM
Find more content like what you just read:
-
Log management best practices
By: TechTarget Security
Type: eGuide
Investing in the correct log management tool can ensure that the pressures of maintaining enterprise system log data are greatly decreased. Although the right tool is very helpful, the possibility of it turning into the wrong tool can happen in the blink of an eye if the correct steps are not taken.
-
E-Guide: Bringing Value to Application Monitoring Through SIM
By: TechTarget Security
Type: eGuide
This expert e-guide describes the value that security information and management systems (SIMs) can bring to both application monitoring and real-time security. See how you can get the most out of SIM by reading on now.
-
The Improvement and Evolution of SIEM
By: TechTarget Security
Type: eGuide
Get an in-depth look at the past, present and future of security information and event management (SIEM) technology in this informative E-Guide from SearchSecurity.com.
-
The state of CISO influence report
By: Coalfire
Type: Analyst Report
CISOs and cybersecurity policy play a much more important role in business decisions than ever before. This is despite the fact that the majority of large and small companies spend less than $5 million annually on cybersecurity. Access the State of CISO Influence report here to learn about the state of security.
-
Building a successful data loss prevention program
By: Reply
Type: eBook
Data breaches and the resulting data loss can lead to destructive results. An effective data loss prevention (DLP) solution eliminates data duplication and can help centrally manage data and eliminate serious breaches. This e-book looks at what it takes to develop a successful DLP solution in order to secure your organization. Read on to learn more
-
How to retain security analysts & more: A discussion
By: Endace
Type: Webcast
Darktrace’s VP of Tactical Risk and Response joins Michael Morris in this episode of Endace’s “Secure Networks: The Packet Forensics Files.” The two discuss nation-state cyberattacks, recent security mandates, and more. View now to unlock their insightful conversation.
-
Bitcoin, App Security, and Oracle's Controversial Licensing Policies
By: TechTarget ComputerWeekly.com
Type: Ezine
Discover how blockchain, the tech behind bitcoin, is extending its reach beyond financial services into new industries. Also learn from developers about the pros and cons of componentizing application software, examine what a recent court case shows about Oracle's licensing policies, and more.
-
Unlock a conversation about threat hunting & more
By: Endace
Type: Webcast
In this webcast, Endace’s Michael Morris chats with Packet Pioneer’s Chris Greer about threat hunting’s benefits, the factors that inhibit security teams on their journeys to leveraging threat hunting, and more.
-
The state of cybersecurity
By: JAMF
Type: Research Content
Jamf’s annual security report analyzes how the threat landscape is evolving by studying real-world customer data, cutting-edge threat research, and noteworthy industry events to provide a bird’s eye view of the landscape as a whole. Download the report now to learn more about the state of cybersecurity.
-
How Can You Augment Your Security Posture?
By: Novacoast
Type: Product Overview
With cyberthreats multiplying, your organization faces growing risk. In these challenging circumstances, how can you augment your security posture? Download this overview to learn about cybersecurity services that can help.
-
White Paper: Evaluator’s Guide For Managed Detection and Response (MDR) Services
By: AT&T Cybersecurity
Type: eBook
Managed detection and response (MDR) tools play a key role in enabling streamlined and unified security processes – however, finding the right MDR solution can be challenging. Read this MDR buyer’s guide to learn the basic MDR services, evaluation criteria, pitfalls to avoid, and more.
-
Modernizing SOC: Catalysts and Strategies
By: Endace
Type: Webcast
In this webcast, Vectra AI’s Technical Director joins Endace’s Michael Morris in a conversation about SOC modernization. They discuss the trend’s causes, the core principles of a successful modernization strategy, and more.
-
8 actions for stronger OT cybersecurity
By: Nomios
Type: eBook
Along with digging into the major cybersecurity threats troubling OT, such as IoT botnets and malware attacks, this e-book outlines 8 actions that organizations can take to defend their OT environments. Review the book and elevate your OT security preparedness.
-
Attack surface management buyer’s guide
By: Ionix
Type: Analyst Report
The evolution and adoption of new digital technologies has led to a rapid expansion of the attack surface. This Kuppingercole report aims to provide an overview of the attack surface management (ASM) market and give you a compass to help you to find the solution that best meets your needs. Read on to learn more.
-
El Camino Health Leverages Trusted Partner for Networking and Security Refresh
By: Insight
Type: Case Study
When this healthcare organization began to struggle with their aging network infrastructure and security model, they sought out a way they could update their technology without negatively affecting their patient care. Access this case study to hear the full story.
-
5 key security trends impacting organizations
By: JAMF
Type: Research Content
The number of remote users that IT and security teams are supporting has risen from 21% to 46% since the pandemic. This report explores 5 key security trends impacting organizations as organizations continue to utilize remotely accessible applications hosted on private and public data centers. Read on to learn more.
-
Understanding the origins of the security skills shortage
By: Security Journey
Type: Analyst Report
The security skills shortage has hindered organizations’ abilities to build secure programs. This report presents the findings of a study EMA conducted with 129 professionals across multiple industry verticals, seeking to understand how organizations are tackling the difficult challenge of developing secure software. Read on to learn more.
-
Healthcare security: Mission critical
By: ARG, Inc.
Type: Case Study
Read this case study to learn how ARG helped AbsoluteCare, a leading healthcare provider for vulnerable populations, find the best match for their infrastructure and security needs.
-
10 Essential Capabilities of a Best-of-Breed SOAR
By: Splunk
Type: White Paper
Overwhelmed security teams have turned to security orchestration, automation and response (SOAR) as a remedy — but not all SOAR solutions are created equal. This white paper outlines 10 essential capabilities that should be top-of-mind when evaluating SOAR technology.
-
Top OT cybersecurity risks & how to defend against them
By: Nomios
Type: eBook
As cybercriminals continue to target older operational technology (OT) systems, security leaders are pressed to bolster defenses. To help them do so, this e-book details the top risks associated with OT systems and the ways that businesses can strengthen their security stances. Read on to access these insights.
-
3 ways to secure modern edge networks
By: Fortinet, Inc.
Type: White Paper
Fortinet's Hybrid Mesh Firewalls provide centralized management & AI-powered protection for hybrid networks. Leveraging proprietary security chips, the solution secures data centers, branches, public clouds & remote sites.
-
State of security hygiene: Enterprise Strategy Group report
By: Ionix
Type: ESG Research Report
To review 6 key findings about the increasingly decentralized and complex state of security hygiene and posture management (SHPM), download this 32-page research report by TechTarget’s Enterprise Strategy Group (ESG).
-
A CISO’s guide to attack surface management
By: Palo Alto Networks
Type: White Paper
To protect your attack surface, a modern ASM must work at the speed and scale of the internet to continuously discover, identify, and mitigate all risks. Learn which features to look for in a new ASM, and how to put into place, in this white paper.
-
Top threats to security asset management: What to know
By: iT1 Source
Type: ESG Research Report
17% of organizations report that their approach to security hygiene and posture management (SHPM) is completely decentralized, while 41% consider their approach to be only partially centralized, according to research by Enterprise Strategy Group (ESG). To learn more about the complex state of SHPM, dig into this ESG report.
-
Securing the perimeter-less network with increased visibility
By: Fortinet, Inc.
Type: Product Overview
With the death of the network perimeter, cybercriminals have proven that every asset is a potential entry point for an attack. FortiGate Next-Generation Firewalls
-
Multi-cloud adoption: A double-edged sword
By: Expel
Type: Analyst Report
Security-enabled innovation has yielded anticipated benefits for organizations, but managing costs and resources and ensuring consistent security policies pose significant challenges. In this analyst report, explore key findings and survey results to better understand the double-edged sword of multi-cloud adoption.
-
E-book: 6 security leaders’ biggest challenges
By: SoSafe
Type: eBook
What do security leaders cite as their biggest challenges? In this 27-page e-book, 6 security leaders – from Signal Iduna, Randstad and more – share their thoughts. Keep reading to unlock those insights.
-
Key questions to ask when looking for security risks
By: Expel
Type: eBook
Talent shortage, tool overload, attack surface expansion: These are just a few of the many challenges security teams are facing this year, making it feel like it is impossible to cover all your bases. In this e-book, discover 3 clear steps any organization can make to get the most out of their security tech stack.
-
SIEM IT Decision Center- Checklist #1
By: TechTarget Security
Type: eGuide
If you are looking into deploying your own SIEM system, read this E-Guide to better understand features and functions, how to evaluate deployment and management costs, and the latest trends regarding SIEM platforms.
-
Enhance your mainframe security with Broadcom
By: BROADCOM, Inc
Type: White Paper
Your mainframe houses sensitive data—data that threat actors work hard to exfiltrate through phishing attacks. In the face of this threat, how can you strengthen your mainframe security? Unlock tips in this guide.
-
Unlocking the Opportunity of SIEM Technology
By: TechTarget Security
Type: eGuide
Explore how a security information and event management (SIEM) system works, what types of data you can integrate into it, the process for detecting threats/incidents, and steps you should take to develop a successful SIEM capabilities.
-
Third party risk management: A path to a program
By: Coalfire
Type: White Paper
This white paper dives into what risks third-party management faces and how it can change the course of a cyber program. Read on to learn more.
-
Full Mainframe Protection for The Entire Security Lifecycle eBook
By: BROADCOM, Inc
Type: eBook
If you’ve shifted to a hybrid IT infrastructure, then you’re familiar with the process of reassessing your security management. Throughout your reassessment, did you make sure to consider your mainframe? If not, this e-book can help. Read on to learn about modernizing your mainframe security with Broadcom.
-
E-Guide: Improving software with the building security in maturity model
By: TechTarget Security
Type: eGuide
This expert tip introduces a model that utilizes a framework to organize software security tasks and help organizations determine where their security practices stand and how to advance them over time.
-
Speeding up vulnerabilty detection with automation
By: ServiceNow
Type: eBook
Almost half of all CIOs believe their cybersecurity may not be on par with their digital transformation efforts, but 80% of organizations that use automation say they can respond to vulnerabilities in a shorter timeframe. Download this white paper to help
-
Enterprise Strategy Group report: Boosting OT cybersecurity
By: Palo Alto Networks
Type: ESG Economic Validation Report
Due to their lack of built-in security, OT assets – such as critical smart devices – tend to be highly susceptible to cyberattacks. In the face of increasingly complex cyberthreats, how can you level up your business’s OT cybersecurity? Unlock guidance in this Economic Validation report by TechTarget’s Enterprise Strategy Group (ESG).
-
SIEM IT Decision Center- Checklist #2
By: TechTarget Security
Type: eGuide
This white paper presents SIEM use cases and technical information for security and compliance pros to better understand the threat landscape and help move their RFP process forward.
-
6 Point SIEM Solution Evaluation Checklist
By: TechTarget Security
Type: eGuide
This E-Guide from SearchSecurity.com explores the top six evaluation criteria you should keep in mind when investing in a security information and event management (SIEM) solution. View now to learn more!
-
Endpoint Security IT Decision Center Handbook 2
By: TechTarget Security
Type: eGuide
Access this expert handbook to discover which features any endpoint protection software should have, and 10 questions to ask your vendor before choosing your next IT security investment.
-
Step by Step: Best practices for security patch management
By: TechTarget Security
Type: eGuide
Whether you're new to patch management or just need a refresher, this expert e-guide reviews best practices for security patch management to ensure accurate, effective patch testing in your organization.
-
Focusing on SIEM Integration: A 6 Point SIEM Solution Evaluation Checklist
By: TechTarget Security
Type: eGuide
Organizations should take careful consideration before implementing a SIEM solution. This expert e-guide will cover six points to consider before selecting a solution and explore the benefits it can bring to your business.
-
Threat Management: Devising a new strategy to tackle today's cyberattacks
By: TechTarget Security
Type: Essential Guide
This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.
-
Micro-segmentation: Worth the hype?
By: Illumio
Type: Research Content
The purpose of incorporating micro-segmentation as part of a larger Zero Trust security strategy is to prevent threat actors from moving laterally within a network – but how effective is micro-segmentation in practice? Read this research report for an in-depth analysis of the capabilities, challenges and potential benefits of micro-segmentation.
-
Keeping your cybersecurity on pace with your innovation
By: Reply
Type: eBook
As more enterprises push towards continuous digital transformation, they are met with unprecedented cyber risks and often do not have enough specialized support on issues related to innovative technologies. Read this eBook to learn about Pervasive Security, a new paradigm that integrates well with modern digital services implementation initiatives.
-
Security Big Data: Preparing for a Big Data Collection Implementation
By: TechTarget Security
Type: eBook
This expert e-guide from SearchSecurity.com offers realistic advice to help your enterprise information security team understand what technology and processes must be in place in order to properly and securely take advantage of big data.
-
E-Guide: Physical Security Awareness and Smartphone Security Policy
By: TechTarget Security
Type: eGuide
In this e-guide, gain key insight for establishing better physical security and employee awareness for device usage. View now to uncover best practices and technologies that can help you lock down devices, and how to put device responsibility back in the hands of the employee.
-
Security leader’s guide to cybersecurity strategy
By: WatchGuard Technologies, Inc.
Type: eBook
The success of cybersecurity can only be achieved through a strategic approach that effectively combines different tools to address the problems at hand. This e-book contains several examples of cybersecurity power plays that can dramatically boost security efficacy and operational efficiency. Read on to learn more.
-
Dell’s 3 Pillars of Modern Security
By: FCN
Type: White Paper
Review this white paper to discover the 3 pillars of Dell’s holistic approach to modern security.
-
How Zoom revamped their security training standards
By: Security Journey
Type: Case Study
Zoom’s rapid growth occurred over an extremely short period of time, necessitating an immediate reevaluation of their security protocols. Zoom partnered with Security Journey to develop new security training protocols that enabled them to meet the compliance standards their newfound success required. Download the case study now to learn more.