IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Network Forensics

RSS Feed   
ALSO CALLED: Cyberforensics, Security Forensics, Digital Forensics, Forensic Analysis, Forensics
DEFINITION: Network forensics is the capture, recording, and analysis of network events in order to discover the source of security attacks or other problem incidents. (The term, attributed to firewall expert Marcus Ranum, is borrowed from the legal and criminology fields where forensics pertains to the investigation of crimes.) According to Simson Garfinkel, author of several books on security, network forensics  … 

Network Forensics definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Network Forensics Reports
1 - 25 of 55 Matches Previous Page  |  Next Page
Top 10 Use Cases for User and Entity Behavior Analytics
sponsored by Exabeam
WHITE PAPER: Enterprises are implementing user and entity behavior analytics (UEBA) to determine what is “normal” behavior on a network. Gartner projects a 48% compound annual growth rate for this technology. Want to learn more about UEBA? Read this white paper to learn the top 10 use cases for UEBA and see if it’s right for your security architecture.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

Exabeam

10 Tips to Strengthen your Insider Threat Program
sponsored by Dtex
EBOOK: With the commonality of remote work creating more vulnerability than ever, strengthening threat detection has become paramount. But how do you go about putting your eggs in the right security baskets? Read this explosive e-book for 10 tips for strengthening your insider threat program.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Dtex

The XDR Payoff: Better Security Posture
sponsored by Trend Micro
ANALYST REPORT: Extended detection and response (XDR) has drawn much attention in recent months due to its ability to aggregate, correlate and analyze signals across multiple security controls. For some organizations, this could mean an improved security posture. Read this ESG report to view an analysis of the prospective value of XDR in numbers.
Posted: 02 Nov 2020 | Published: 30 Sep 2020

Trend Micro

Cost of Insider Threats: Ponemon Global Report
sponsored by IBM
ANALYST REPORT: The frequency and cost of insider threats have increased significantly. Negligence, criminals, malicious insiders and credential thieves are all causes, and 60% of organizations have had more than 20 incidents per year since 2016. Jump into this Ponemon global insider threat report to learn more about these actors and what they cost.
Posted: 29 Oct 2020 | Published: 26 Aug 2020

IBM

Secure: Now 2020 - Are Your Cyber Defenses Fully-Geared for the Digital Era?
sponsored by Lumen
WEBCAST: Bad actors and threats are evolving faster than organizations can react, and although security & risk management (SRM) leaders know they need to continually evolve upgrade their cyber defenses, businesses still fall victim to cybercrimes. Watch this webinar by Lumen subject matter experts to learn why you may need to do more for cybersecurity.
Posted: 28 Oct 2020 | Premiered: Sep 10, 2020

Lumen

Aruba Policy Enforcement Firewall — Cyber Catalyst Designation
sponsored by Tech Data
RESOURCE: In this quick fact sheet, find out how the Aruba Policy Enforcement Firewall is designed to be a key component of any organization’s zero-trust architecture.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

Tech Data

AI-Driven EDR
sponsored by BlackBerry
EBOOK: Endpoint detection & response (EDR) is a rapidly evolving technology that continues to outsmart threats outside the network and respond to those within it. Now, the power of artificial intelligence is granting EDR even more capability while lowering cost. Jump into this e-book to get a closer look at AI-driven endpoint detection & response.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

BlackBerry

Understanding & Preventing Ransomware Attacks
sponsored by Keeper Security Inc
WHITE PAPER: Ransomware attacks are particularly devastating in that they can be done with little technical expertise – they can even be purchased as a cloud service! A new attack happens about every 14 seconds, and their global damages are expected to reach $20B by 2021. So how can you prevent them? Read this white paper to find out.
Posted: 12 Oct 2020 | Published: 12 Oct 2020

Keeper Security Inc

Around the World in 34 Phish: COVID-19 Phishing Examples
sponsored by Inky Technology
RESOURCE: The state of the world has left email servers more vulnerable to attack than ever. As phishing is the most used method of cyberattack in the world, there have been plenty of examples to identify and dissect to help people develop a more watchful eye. Browse this article to see 34 different examples of phishing scams across the globe.
Posted: 28 Sep 2020 | Published: 28 Sep 2020

Inky Technology

Ask These Critical Questions and Consider These Risks When Selecting an MDR Provider
sponsored by GoSecure
RESOURCE: According to Gartner, 25% of organizations will be using managed detection and response (MDR) services by 2024. So when considering key requirements and managing risks associated with outsourcing threat detection and response, it’s critical that you ask the right questions. View this Gartner report to learn what these questions are and more.
Posted: 23 Sep 2020 | Published: 31 Oct 2019

GoSecure

Using Network and Wi-Fi Analytics to Help with Workplace Safety
sponsored by Comcast Business
RESOURCE: Business leaders need to consider monitoring processes and technologies that balance maintaining safety with respect for the privacy and work habits of their employees. As such, organizations of all sizes can leverage their computer and communication networks to enable such automated monitoring processes. Read this article to learn more.
Posted: 15 Sep 2020 | Published: 06 May 2020

Comcast Business

Ransomware Decoded
sponsored by Cybereason
WHITE PAPER: Ransomware has reemerged, and ransom payments have shot up in tandem, with the average payout at $80,000 in Dec. 2019. In addition, it’s evolving to avoid detection, and with the advent of Ransonware-as-a-Service (RaaS), even non-technical users can create an attack. Stay vigilant, read this white paper to learn what modern ransomware looks like.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Cybereason

The State of Cloud Security 2020
sponsored by Sophos
ANALYST REPORT: To understand the balance between flexibility and vulnerability in the public cloud, a survey of 3,251 IT managers across 26 countries was conducted. The study shows the ways in which attackers are changing the rules to find new ways into environments and exposing security gaps that were once unknown. Read the full report to go in-depth.
Posted: 10 Sep 2020 | Published: 31 Jul 2020

Sophos

Cybereason EDR
sponsored by Cybereason
DATA SHEET: Endpoint detection & response (EDR) allows organizations to monitor their environments with force, so they can know when a threat is present and respond in seconds, rather than days. Plus, it correlates an attack across all endpoints to give a single view of an attack in real time. View this data sheet to get a closer look at key capabilities.
Posted: 10 Sep 2020 | Published: 10 Sep 2020

Cybereason

Why You Should Consider Endpoint Detection & Response
sponsored by Claranet
EGUIDE: Endpoint security has become an especially hot topic over the past few months. Organizations need to put clamps on hackers who attempt to breach their infrastructure. As such, traditional legacy endpoint security systems may not be able to stand up to modern threats. Read this expert guide to learn about endpoint detection & response.
Posted: 10 Sep 2020 | Published: 10 Sep 2020

Claranet

Seven Must-Have Endpoint Management Capabilities
sponsored by HCL Software
DATA SHEET: When endpoint management systems are effectively integrated with security and IT operations tools, they play a major role in proving compliance, stopping threats, consolidating tools, and protecting brands. Read the study to learn the Seven Must-have Endpoint Management Capabilities.
Posted: 08 Sep 2020 | Published: 30 Sep 2019

HCL Software

Mitigating Application DDoS Attacks
sponsored by F5 Networks
WEBCAST: Your network, DNS & TLS are not often thought of as being part of applications. Yet DoS or DDoS attacks against these tiers can render your networks, apps or other supporting infrastructure inaccessible. The challenge is identifying & blocking attackers’ requests whilst still allowing clean traffic. View this webinar to learn how to do this.
Posted: 08 Sep 2020 | Premiered: Sep 8, 2020

F5 Networks

Encrypted DNS - Mitigating the Impact of DoT and DoH for Service Providers
sponsored by F5 Networks
WEBCAST: DNS is fundamental to how the internet functions, but growth in DNS encryption potentially renders DNS infrastructure redundant. As a result, service providers will need to understand the challenges and opportunities of encrypted DNS. Jump into this webcast to cover the impact of encrypted DNS from the service provider's perspective.
Posted: 08 Sep 2020 | Premiered: Sep 4, 2020

F5 Networks

The CIO’s Cybersecurity Checklist
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: CIOs have never been under more duress than they are under now. An enlarged attack surface coupled with a growing threat landscape means that senior leaders have to dot their i’s and cross their t’s when it comes to network security. Want to stay ahead? View this CIO cybersecurity checklist to know where you are and where you need to be.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Arctic Wolf Networks, Inc.

Secure Your Network and Stop Cybercriminals from Capitalizing on a Crisis
sponsored by Comcast Business
DATA SHEET: Threat actors have long been taking advantage of increased network vulnerabilities up to this point, but in order to fight the good fight, you must be up to speed on security architectures and technologies that are disrupting both hackers and the security industry. View this data sheet to learn to securely navigate the pandemic.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Comcast Business

A Web of Weak Spots: Securing Your Supply Chain with NDR and Collective Defense
sponsored by IronNet
WHITE PAPER: Today’s supply chain is an extended enterprise with many back doors. Indirect attacks against weak links in the supply chain now account for 40% of security breaches. How can you better protect your data? Dig into this white paper to learn the 5 most common attacks and how network detection & response can help prevent them.
Posted: 03 Sep 2020 | Published: 03 Sep 2020

IronNet

Securing the Pandemic-Disrupted Workplace
sponsored by Trend Micro
ANALYST REPORT: COVID-19 has granted threat actors the permission to get their hands as dirty as possible. A spike in remote work has given them a larger attack surface than ever, and although the number of new cases is decreasing, these attacks show no signs of going away. To get the numbers behind the danger, jump into this in-depth report.
Posted: 02 Sep 2020 | Published: 02 Sep 2020

Trend Micro

Hacker vs CISO: Exploiting and Protecting Your WFH Workforce
sponsored by Tanium
WEBCAST: The hacker is the bane of the CISO, and vice versa. It’s not often that both of these enigmatic personas are in the same room to speak on organizational security and the threat landscape, and during an era of global remote work, their words are quite valuable. Watch this unique webcast to learn perspectives from two opposing security combatants.
Posted: 01 Sep 2020 | Premiered: Aug 28, 2020

Tanium

5 Critical Requirements for Internal Firewalling in the Data Center
sponsored by VMware International Unlimited Company
WHITE PAPER: Forrester reports that 58% of companies faced a significant security incident in 2019 despite spending more to secure their networks. Much of this is due to overreliance on perimeter firewalls, which has been a handicap for organizations in recent years. Open this VMware report to get a glimpse at their next-generation firewall technology.
Posted: 01 Sep 2020 | Published: 31 Mar 2020

VMware International Unlimited Company

Penetration Testing Vendor Selection Checklist
sponsored by Synack
RESOURCE: In today’s IT environment, one of the biggest risks to a corporation’s valuation is a security breach. But how does a security team apply their budget in a way that ensures the applications, websites, and other assets are secure? What requirements are the most important? Use this comprehensive checklist to help you evaluate vendors.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Synack
1 - 25 of 55 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info