IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Host IDS

RSS Feed   
Host IDS Reports
 
Detecting a Java Backdoor with Dtex
sponsored by Dtex
CASE STUDY: In this case study, see how a financial services company fell victim to a java backdoor attack – despite having AV, EDR and other security tools deployed – and discover how Dtex’s detection and forensic capabilities enabled a complete time of resolution of under 24 hours.
Posted: 02 Dec 2020 | Published: 02 Dec 2020

Dtex

Detection & Response: To Outsource or Not to Outsource
sponsored by AWS Rapid7
VIDEO: The cybersecurity skill shortage often leaves security teams feeling overworked and underprepared – or as Hamlet might say, “foolish prating knaves”. Watch this webinar, Detection & Response: To Outsource or Not to Outsource, and discover which option is best fit based on your organization’s needs.
Posted: 11 Dec 2020 | Premiered: 11 Dec 2020

AWS Rapid7

AT&T Business: Customer Stories – NHS Management, LLC
sponsored by AT&T Cybersecurity
CASE STUDY: In this case study, see how NHS Management, a healthcare provider that supports 50 nursing homes, was able to address the growing security needs of their patients and establish a threat detection and incident response program that allowed them to protect and prevent unwanted access to patient data – read on for the full story.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

AT&T Cybersecurity

How to Improve Your Security Incident Response Process
sponsored by ServiceNow
EGUIDE: Nearly every day there's a new headline about one high-profile data breach or another. But there are many more incidents that go unnoticed because organizations don't know how to detect them. In this e-guide, learn how to detect key symptoms that signal a problem. Also, explore tips to help you better respond to these incidents.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

ServiceNow

Operationalizing Threat Intelligence Using Splunk Enterprise Security
sponsored by Splunk
WHITE PAPER: Explore the challenges and requirements of implementing high-coverage threat intelligence, and how your organization can achieve operational maturity.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

Splunk

Implications of MITRE ATT&CK for Security Teams
sponsored by BlueVoyant
EBOOK: The MITRE ATT&CK framework is a global knowledge hub of observed cyberattack methods and tactics, designed to enable security teams with key insights for detecting and responding to an incident. This e-book offers an overview of the MITRE ATT&CK framework, its history and the implications for security teams. Read on to get started.
Posted: 11 May 2020 | Published: 11 May 2020

BlueVoyant

The 2020 State of Security Operations
sponsored by Palo Alto Networks
WHITE PAPER: A successful data breach can have devastating impacts – from loss of data to loss of customer trust and potential litigation. This Forrester report aims to identify and understand the challenges facing security operations (SecOps) teams as they work to manage the growing threat of sophisticated data breaches.
Posted: 01 Sep 2020 | Published: 30 Apr 2020

Palo Alto Networks

Managing Security Risks and Vulnerabilities
sponsored by IBM
WHITE PAPER: Read now to learn about automated labor-saving automation, a platform that incorporates vulnerability analysis, risk management, and remediation support, all within a single console.
Posted: 06 Mar 2014 | Published: 31 Jan 2014

IBM

HP TippingPoint Provides Next-Generation Network Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This informative paper examines an intrusion prevention system that is simple, reliable, and effective, ensuring that your network is kept safe from unwanted access or attacks.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

Hewlett Packard Enterprise

Practitioners Guide to Establishing a SOC Webinar
sponsored by AT&T Cybersecurity
WEBCAST: This AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).
Posted: 16 Jul 2013 | Premiered: Jul 16, 2013

AT&T Cybersecurity
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info