IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Event Management

RSS Feed   
Security Event Management Reports
1 - 25 of 733 Matches Previous Page  |  Next Page
Equifax Breach Lessons: How to Avoid Becoming the Next Victim
sponsored by WhiteSource
WEBCAST: Learn about the story behind the largest data breach to date. Understand the root cause, the timeline and why it was preventable. This webcast offers advice on how to avoid being the next Equifax. Some key suggestions include: implementing the right solution, changing the way you think and deal with application security and acting fast.
Posted: 14 Jan 2019 | Premiered: Nov 9, 2017

WhiteSource

SANS Product Review Webinar
sponsored by WhiteSource
WEBCAST: Whitesource's open source security solution helps automate the finding of vulnerabilities and open source components and then bridges the gap between development and security professionals. In this webcast, Serge Borso will share his experiences working with Whitesource over the last couple of months.
Posted: 14 Jan 2019 | Premiered: Oct 3, 2018

WhiteSource

DomainTools Guide to Threat Hunting with Splunk and Phantom
sponsored by DomainTools
WEBCAST: Threat hunting is a hypothesis driven approach to validating the collection, detection and analysis of data ahead of an incident. The first step to integrating threat hunting into your organization is establishing a true threat hunting program. In this webcast, learn about a number of threat hunting essentials.
Posted: 14 Jan 2019 | Premiered: Jan 14, 2019

DomainTools

The Beginner's Guide to Threat Hunting
sponsored by DomainTools
WEBCAST: Threat hunting is a hypothesis driven approach to validating the collection, detection and analysis of data ahead of an incident. It is important to establish a threat hunting process to have for reference before any possible incidents. In this webcast, learn about the key steps to creating a threat hunting process.
Posted: 11 Jan 2019 | Premiered: Dec 31, 2018

DomainTools

SANS Fingerprinting Threat Actors with Web Assets
sponsored by DomainTools
WEBCAST: Threat intelligence helps companies better predict the actions of threat actors to stay ahead of their attacks. In order to do this, organizations must learn more about the enemy. In this webcast, SANS instructor Rebekah Brown and Data Systems Engineer at DomainTools, Mike Thompson discuss ways to better fingerprint threat actors.
Posted: 11 Jan 2019 | Premiered: May 31, 2018

DomainTools

SANS 2018 Threat Hunting Survey Results
sponsored by DomainTools
WHITE PAPER: Threat hunting is a focused and iterative approach to searching out, identifying and understanding adversaries who have entered the defender's networks. Threat hunting is a hypothesis-driven approach to validating the collection, detection and analysis of data ahead of an incident. In this white paper, learn about all things threat hunting.
Posted: 11 Jan 2019 | Published: 30 Sep 2018

DomainTools

The State of Open Source Vulnerabilities Management
sponsored by WhiteSource
RESEARCH CONTENT: Open source usage is a mainstream practice in this day and age. The rise in open source usage has led to a dramatic rise in open source vulnerabilities, bringing to the fore interesting developments in open source security. This report drills down into the deeper layers of the open source phenomena.
Posted: 08 Jan 2019 | Published: 08 Jan 2019

WhiteSource

Security and Compliance Mandates Can Be Draining. Here's How to Recharge.
sponsored by OneNeck IT
WHITE PAPER: It is easy to be overwhelmed by security threats and data breaches however; there are a number of simple yet effective steps you can take right now to regain your focus and control. In this white paper, discover 5 steps to recharging your security and compliance efforts.
Posted: 07 Jan 2019 | Published: 07 Jan 2019

OneNeck IT

The Suspicious Seven: A Network Visibility Checklist
sponsored by OneNeck IT
RESOURCE: Discovering key insights into attackers' behaviors and location within your environment can help you prevent a security event from becoming a full-blown data breach. This checklist provides 7 of the most common types of network blind spots and suspicious activities.
Posted: 07 Jan 2019 | Published: 31 Mar 2017

OneNeck IT

A New SIEM for a New World
sponsored by Empow Cyber Security
WEBCAST: With the rise of digital business, attack surfaces have expanded, data has become more abundant and complex and alerts have become a hindrance rather than a help. Traditional SIEMs aren't able to keep up with this new environment. Watch this webinar to learn about the kind of SIEM today's dynamic world requires.
Posted: 27 Dec 2018 | Premiered: Dec 27, 2018

Empow Cyber Security

Cybersecurity Operations: Realities and Strategies
sponsored by Empow Cyber Security
WEBCAST: Traditional cybersecurity technologies were not built for today's dynamic environments. They were designed for a simpler time, but the world has changed and security strategies and technologies must change with it. Listen as Jon Oltsik, Senior Principal Analyst at ESG discusses how to keep your organization safe.
Posted: 27 Dec 2018 | Premiered: Dec 27, 2018

Empow Cyber Security

Data Breach: Security Investigation, Detection and Rapid Response
sponsored by Splunk
WHITE PAPER: Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact of the breach, and the most appropriate course of action.
Posted: 17 Dec 2018 | Published: 01 May 2017

Splunk

Splunk Quick Start for SIEM
sponsored by Splunk
DATA SHEET: Simple monitoring of traditional security events is no longer enough. Learn how you can effectively mitigate risk and detect malware easier, today.
Posted: 17 Dec 2018 | Published: 17 Dec 2018

Splunk

The Soar Buyer's Guide: Security Orchestration, Automation, & Response
sponsored by Splunk
WHITE PAPER: This buyer's guide outlines the important criteria you should consider when evaluating security orchestration, automation, and response platforms, including core components, platform attributes and business considerations. Plus, find a checklist you can print out, read over, and mark up as you evaluate platform options.
Posted: 17 Dec 2018 | Published: 17 Dec 2018

Splunk

What's Threatening IT Security?
sponsored by Aruba Networks
RESOURCE: What are the causes of gaps in IT security? Is the Internet of Things making it worse? Can AI and automation fix it? Download this resource to see what the Ponemon Institute recently found.
Posted: 17 Dec 2018 | Published: 17 Dec 2018

Aruba Networks

State of the Channel Ransomware Report: Canadian Edition
sponsored by Datto, Inc.
EBOOK: More than 200 Canadian MSPs share their ransomware hardships and triumphs, with specifics on how ransomware is targeting customers—in particular, SMBs—and recommendations for recovery and business continuity. Read on for a unique look into the state of ransomware.
Posted: 07 Dec 2018 | Published: 31 Dec 2017

Datto, Inc.

Alert Logic Professional: Intrusion Detection and Log Management
sponsored by Alert Logic
RESOURCE: Learn how your business can benefit from intrusion detection and log management, backed by 24/7 monitoring and threat analysis from certified security experts
Posted: 03 Dec 2018 | Published: 03 Dec 2018

Alert Logic

How 1 University Keeps Their Petabytes of Data Safe
sponsored by Atempo, Inc.
CASE STUDY: Download this case study to learn more about how University of Lausanne was able to secure its several petabytes of data stored in 3 data centers.
Posted: 20 Nov 2018 | Published: 20 Nov 2018

Atempo, Inc.

Intrusion Detection Systems (IDS)
sponsored by Armor
WHITE PAPER: In this white paper, learn about 2 different Intrusion Detection Systems (IDS) that can analyze and correlate all security events, and trigger further investigation by a Security Operations Center when necessary.
Posted: 19 Nov 2018 | Published: 19 Nov 2018

Armor

The State of Application Security in Today's Application Economy
sponsored by Micro Focus
WHITE PAPER: As companies become active players in the application economy, the implications of security—and the lack thereof—loom over them. Organizations that have never before given thought to security are now concerned about the risk posed by their applications. In this IDG quick poll, uncover considerations for building your application security strategy.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

Micro Focus

IT Procurement: The Weak Link in Government Security
sponsored by HP
RESOURCE: In this resource, uncover IDC's findings on the extent to which device security is being considered in public procurement of PCs and printers.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

HP

Analytics-drive Security: The Next Frontier for CSOs
sponsored by Splunk
RESOURCE: In this resource, learn about an analytics-driven security technology that is designed to connect the dots faster to help predict patters, identify suspicious behavior, and automate corrective actions
Posted: 20 Nov 2018 | Published: 20 Nov 2018

Splunk

Best Practices for Applying Threat Intelligence
sponsored by Recorded Future
WHITE PAPER: In this white paper, learn how threat data can be processed into information and (ultimately) intelligence. Plus, explore the 4 key areas your threat intelligence implementation must deliver.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

Recorded Future

Employing Machine Learning in Security and UEBA: A Data-Science Driven Approach
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this white paper to learn how machine learning can enable your team and technology to be better, smarter, and faster by having advanced analytics at its fingertips to solve real problems – like detecting User and Entity Behavior Analytics threats – quickly.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

LogRhythm, Inc.

How to Build a SOC with Limited Resources: Your Guide to Detecting and Responding to Threats Fast
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this white paper to learn how you can integrate a threat lifecycle management platform to successfully build a SOC, even with limited resources.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

LogRhythm, Inc.
1 - 25 of 733 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement