IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Information and Event Management

RSS Feed   
Security Information and Event Management White Papers (View All Report Types)
 
Evolution of ICS Attacks and the Prospects for Future Disruptive Events
sponsored by Dragos
WHITE PAPER: Headlines are full of proclamations covering the latest in industrial control system (ICS) attacks and threats to critical infrastructure. In this white paper, explore an analysis of ICS disruptive events from the past 4 years. Also, learn how these threats have evolved over time, and what measures are necessary to defeat them.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Dragos

Splunk Security Use Case Detecting Unknown Malware and Ransomware
sponsored by Splunk
WHITE PAPER: This white paper will take users on a step-by-step journey through how to detect malware activity and early signs of compromise in a Windows environment.
Posted: 20 Feb 2019 | Published: 20 Feb 2019

Splunk

Integrating Threat Intelligence into Endpoint Security
sponsored by CrowdStrike
WHITE PAPER: As the threat landscape continues to change security teams need all the help they can get to more effectively prevent, detect and respond to threats. In this white paper, learn how incorporating a threat intelligence platform, like CrowdStrike's Falcon X, into the detection and response workflow could help to significantly enhance investigations.
Posted: 05 Jun 2019 | Published: 30 Nov 2018

CrowdStrike

What to Look for in an MDR Provider
sponsored by Dell SecureWorks
WHITE PAPER: There are plenty of security providers offering Managed Detection and Response (MDR) solutions, but it is important to ensure they offer capabilities that match your business's needs. In this white paper, learn 5 key areas organizations should investigate when evaluating and selecting an MDR provider.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

Dell SecureWorks

Cisco Ransomware Defense: Keep Ransomware at Bay
sponsored by Cisco Umbrella
WHITE PAPER: Files and information are the lifeblood of an organization. Keeping this information secure is nonnegotiable. Without the appropriate defenses, ransomware can inflict enough damage to reduce an organization to operating with pen and paper. In this white paper, learn the benefits of Cisco Ransomware Defense.
Posted: 19 Feb 2019 | Published: 31 Oct 2017

Cisco Umbrella

4 Reasons to Add UBA to Your SIEM
sponsored by Splunk
WHITE PAPER: To combat threats, organizations traditionally have turned to SIEMs. However, more sophisticated use cases require a machine learning-powered solution. This is where user and entity behavior analytics (UEBA) can prove to be an invaluable addition to your SIEM. In this white paper, learn about 4 reasons to add UEBA to your SIEM.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Splunk

8 Essential Elements of a Comprehensive IT Security Strategy
sponsored by Involta
WHITE PAPER: IT security measures should be at the forefront of every business owner's mind. Improving cybersecurity to prevent data loss and protect critical business and financial data is essential. In this white paper, explore 8 elements that play an important role in developing and maintaining secure IT environments.
Posted: 21 May 2019 | Published: 21 May 2019

Involta

Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

LogRhythm, Inc.

The Critical Incident Response Maturity Journey
sponsored by RSA
WHITE PAPER: This paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident.
Posted: 16 Apr 2014 | Published: 31 Dec 2013

RSA

Testing the Cloud: Definitions, Requirements, and Solutions
sponsored by Ixia
WHITE PAPER: Testing of cloud services has some familiar aspects and some new challenges. Gain an understanding of the risks in the cloud, and how to safeguard your organization.
Posted: 02 May 2014 | Published: 02 May 2014

Ixia
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement