IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Intrusion Prevention

RSS Feed   
ALSO CALLED: Network Intrusion Prevention, Host Intrusion Prevention, Intrusion Protection, Network Intrusion Management
DEFINITION: Diffie-Hellman key exchange, also called exponential key exchange, is a method of digital encryption that uses numbers raised to specific powers to produce decryption keys on the basis of components that are never directly transmitted, making the task of a would-be code breaker mathematically overwhelming. To implement Diffie-Hellman, the two end users Alice and Bob, while communicating over a channel  … 

Intrusion Prevention definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Intrusion Prevention Reports
1 - 25 of 172 Matches Previous Page  |  Next Page
Essential Elements of a Penetration Test
sponsored by Synack
WHITE PAPER: A recent study from the White House indicated that cyberattacks cost the economy between $57 and $019 billion. In order to avoid the financial, legal and reputational damage of an attack, organizations are looking to penetration tests. In this white paper, discover why penetration tests are so critical and the emergence of crowdsource testing.
Posted: 27 May 2020 | Published: 27 May 2020

Synack

All Good Remediation Strategies Begin with Collaboration
sponsored by Vulcan
RESOURCE: As cyberattacks grow more frequent as a result of environments becoming more complex, it’s more important than ever for disparate security efforts to be unified under a cohesive strategy. This blog post highlights the benefits of a collaborative remediation approach and offers best practices for cultivating a collaborative remediation culture.
Posted: 27 May 2020 | Published: 06 Apr 2020

Vulcan

Hack the Pentagon Case Study
sponsored by Synack
CASE STUDY: The goal of the Department of Defense’s recent “Hack the Pentagon” program was to mimic realistic cyber threats and assess their critical systems responded to attack from nation states. Read on to unlock the results of this case study and discover why crowdsourced security testing is the new standard for the government.
Posted: 26 May 2020 | Published: 31 Oct 2018

Synack

The Synack Value
sponsored by Synack
DATA SHEET: As business environments become more complex, traditional penetration testing becomes unable to protect against today’s threats. To address this issue, Synack developed a ‘smart’ penetration testing platform, which combines crowdsourced human talent with AI. Download this data sheet to learn more and see how it compares to traditional pen testing.
Posted: 22 May 2020 | Published: 22 May 2020

Synack

Runtime Memory Analysis: A Better Way Forward for Vulnerability Management
sponsored by Rezilion
WHITE PAPER: According to the IDC, large-to-very large enterprises spend 7-10% of their security budget on vulnerability management. However, firms with strong security are equally breached by known vulnerabilities as those with poor security posture. So, what is the best way to approach vulnerability prioritization? Download this white paper to find out.
Posted: 22 May 2020 | Published: 22 May 2020

Rezilion

The Problem with CVSS Scores & What It Means for Vulnerability Management
sponsored by Vulcan
RESOURCE: While CVSS scores are a helpful way to demonstrate and share information about the severity of a vulnerability, it’s not viable as a standalone prioritization tool. In this article, observe an overview of the shortcomings of CVSS scoring as a risk management tool and best practices for using it appropriately.
Posted: 21 May 2020 | Published: 02 May 2019

Vulcan

Your Guide to Mastering Vulnerability Remediation
sponsored by Vulcan
RESOURCE: In order to preemptively contain threats, today’s organizations must have policies, processes and tools in place in order to adequately detect and assess vulnerabilities. This article highlights 8 best practices your organization can take to overcome the common barriers to implementing effective vulnerability remediation. Read on to get started.
Posted: 21 May 2020 | Published: 06 May 2020

Vulcan

Rain Financial Case Study
sponsored by Synack
CASE STUDY: In this case study, follow Rain Financial, a digital currency exchange partner in the Middle East, as they embark on a journey to identify, remediate and proactively protect against vulnerabilities that threaten the security of their customers’ data.
Posted: 21 May 2020 | Published: 21 May 2020

Synack

Vulnerability Remediation in Three Steps
sponsored by Vulcan
RESOURCE: As organizational environments become increasingly complex and security tools more disparate, the teams responsible for vulnerability remediation find themselves dealing with an overwhelming workload. In this article, discover 3 easy steps organizations can take to lower vulnerability risk and improving security posture.
Posted: 20 May 2020 | Published: 28 Nov 2019

Vulcan

Vulnerability Management 2020 Navigating to New Heights
sponsored by Vulcan
WHITE PAPER: Much like the cyberthreat landscape, vulnerability management approaches are constantly evolving to protect organizations against a never-ending onslaught of risks. This white paper exposes the limitations of traditional vulnerability management, and explores where vulnerability management needs to go to meet today’s security needs.
Posted: 20 May 2020 | Published: 31 Dec 2019

Vulcan

Your Vulnerability Management Process Isn't Working
sponsored by Vulcan
RESOURCE: When it comes to vulnerability discover and remediation, it’s easy to get caught up in the details. Every now and then it’s important for CISOs to take a step back and make sure you’re not missing the security forest for the vulnerability trees. This article focuses on three common, but costly, mistakes that IT and security leaders should avoid.
Posted: 19 May 2020 | Published: 21 Mar 2019

Vulcan

Vulnerability Metrics - Which Matter and Which Don't
sponsored by Vulcan
RESOURCE: Metrics enable organizations to share information about cybersecurity risks and demonstrate vulnerabilities – but only if they’re the right metrics. So, how can you delineate between metrics of significance and those that can be ignored? Read on to find out.
Posted: 19 May 2020 | Published: 01 Nov 2018

Vulcan

HOW TO COMBAT Ransomware
sponsored by VMware International Unlimited Company
WHITE PAPER: Ransomware is a rapidly growing and increasingly disruptive form of malware. In fact, it’s estimated that a ransomware attack strikes every 14 seconds or so. In this edition of Global Threats by VMware Carbon Black, explore and dissect what defines a ransomware attack, how they work, and best practices for mitigating them.
Posted: 15 May 2020 | Published: 15 May 2020

VMware International Unlimited Company

Automating Your Vulnerability Remediation Process
sponsored by Vulcan
WHITE PAPER: The vulnerability management lifecycle is a time-consuming set of tasks, making it a perfect candidate for integrating automation into the process. But how should organizations go about this? This white paper provides a set of examples and uses cases for what to do. Read on to get started.
Posted: 15 May 2020 | Published: 30 Jun 2019

Vulcan

Justify Your Vulnerability Management Program
sponsored by Vulcan
WHITE PAPER: In this white paper, Vulcan compiled the results from several vulnerability management studies, conducted by organizations like Gartner, Ponemon, Verizon and more, to provide readers with a comprehensive set of key statistics and figures. Read on to unlock the findings.
Posted: 15 May 2020 | Published: 15 May 2020

Vulcan

The Big Easy - 3 steps for better security
sponsored by Cisco Umbrella
VIDEO: In this video, take a look at the 3 most common threat vectors, and discover best-practices for detecting, isolating and mitigating these threats before they have a chance to strike.
Posted: 15 May 2020 | Premiered: 11 Dec 2019

Cisco Umbrella

Magic Quadrant for Security Information and Event Management
sponsored by IBM
RESOURCE: Growing in usage, security information and incident response (SIEM) capabilities enable organizations to aggregate and process event data across their network to detect and respond to incidents at greater speed. This Gartner Magic Quadrant report overviews and analyzes key SIEM vendors as well as their offerings. Read on to view the results.
Posted: 14 May 2020 | Published: 05 Mar 2020

IBM

2019 CrowdStrike Global Security Attitude Survey
sponsored by CrowdStrike
WHITE PAPER: Each year, CrowdStrike conducts a Global Security Attitude Survey to better understand the current state of incident detection and response. The industry ideal is set at the 1-10-60 rule: 1 minute to detect, 10 minutes to understand, and 60 minutes to contain. Read the research results and see how close organizations came to this benchmark.
Posted: 14 May 2020 | Published: 14 May 2020

CrowdStrike

Implications of MITRE ATT&CK for Security Teams
sponsored by BlueVoyant
EBOOK: The MITRE ATT&CK framework is a global knowledge hub of observed cyberattack methods and tactics, designed to enable security teams with key insights for detecting and responding to an incident. This e-book offers an overview of the MITRE ATT&CK framework, its history and the implications for security teams. Read on to get started.
Posted: 11 May 2020 | Published: 11 May 2020

BlueVoyant

How to Combat Island Hopping
sponsored by VMware International Unlimited Company
WHITE PAPER: Island hopping is a cyberattack strategy in which a hacker targets a smaller organization in order to leverage their affiliation with larger organizations as a point of entry for an attack. This white paper takes a closer look at island hopping tactics and methods for identifying and mitigating them. Read on to learn more.
Posted: 08 May 2020 | Published: 08 May 2020

VMware International Unlimited Company

Building a High-Speed SOC
sponsored by VMware International Unlimited Company
WHITE PAPER: 87% of organizations today feel it’s difficult to recruit and hire cybersecurity talent. The effects of this skills gap are obvious: security teams will be unable to keep pace with the growing volume of threats. In this white paper, discover how the right balance of skilled workers, processes and technology can produce an effective SOC.
Posted: 07 May 2020 | Published: 07 May 2020

VMware International Unlimited Company

YARA-L: A New Detection Language for Modern Threats
sponsored by Chronicle
WHITE PAPER: When it comes to threat detection and incident investigation, most organizations turn to SIEM, SOAR or another similar approach for analyzing security data. However, analyzing data is made more challenging by the increasing amount being generated. In this white paper, learn more about YARA-L, a new detection language for analyzing threat data.
Posted: 07 May 2020 | Published: 07 May 2020

Chronicle

Hunt Like a Pro: A Threat Hunting Guide
sponsored by VMware International Unlimited Company
WHITE PAPER: Threat hunting is a proactive process of scanning the network for potential threats, isolating them and thwarting the malicious behavior before it gets a chance to spread. The goal is to tilt the advantage from the attacker back to the defender. Read this white paper to uncover the best practices necessary to get started hunting threats.
Posted: 30 Apr 2020 | Published: 30 Apr 2020

VMware International Unlimited Company

VMware Carbon Black Cloud Enterprise EDR
sponsored by VMware International Unlimited Company
PRODUCT OVERVIEW: In this datasheet, explore the key features and capabilities of VMware Carbon Black Enterprise EDR, designed to deliver continuous visibility for top security operations centers (SOCs) and incident response (IR) teams as they hunt for threats.
Posted: 28 Apr 2020 | Published: 28 Apr 2020

VMware International Unlimited Company

VMware Carbon Black Cloud Managed Detection Monitoring and Alert Triage
sponsored by VMware International Unlimited Company
PRODUCT OVERVIEW: Today’s security teams are often understaffed and spend too much of their time on tedious, manual tasks. This prevents them from tending to other security areas and slows threat response. In this data sheet, explore VMware Carbon Black Cloud Managed Detection, designed to help by automating some of these tasks. Read on to learn more.
Posted: 27 Apr 2020 | Published: 27 Apr 2020

VMware International Unlimited Company
1 - 25 of 172 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info