IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Security Information and Event Management

RSS Feed   
Security Information and Event Management Reports
Revisiting Public Cloud Security
sponsored by Barracuda
WHITE PAPER: From a survey of 300 ITDMs, this report digs into the benefits and challenges of the public cloud and revisits several strategies to strengthen security. Read on to ensure your organization's public cloud security posture is in good standing.
Posted: 25 Apr 2019 | Published: 25 Apr 2019


Market Guide for User and Entity Behavior Analytics
sponsored by LogRhythm, Inc.
ANALYST REPORT: Security and risk management leaders considering UEBA are finding that the market keeps shifting away from pure-play vendors, toward a wider set of traditional security products that embed core UEBA technologies and features. Download this Gartner report to learn more.
Posted: 23 Aug 2019 | Published: 21 May 2019

LogRhythm, Inc.

Cybersecurity Effectiveness Podcast: Malcolm Harkins
sponsored by Verodin
PODCAST: In this podcast, Cylance Chief Security and Trust Officer Malcolm Harkins reflects on his core leadership philosophies and the processes he implements to cultivate a professional culture of excellence. Listen as he discusses his transition from working at Intel, to joining the cybersecurity start-up, Cylance.
Posted: 29 Aug 2019 | Premiered: Aug 29, 2019


Security Orchestration, Automation and Response (SOAR) Capabilities
sponsored by Swimlane
EBOOK: Cybersecurity is a high-wire act, with significant challenges tied to both technology and operations. Protecting digital assets requires the right tools and processes. One way to handle the growing workload is by using SOAR platforms. In this e-book, review what it takes for a SOAR platform to be successful.
Posted: 16 Apr 2019 | Published: 16 Apr 2019


Spear Phishing: Top Threats and Trends
sponsored by Barracuda
RESOURCE: This report takes an in-depth look at the three most prevalent types of spear phishing attacks—brand impersonation, business email compromise, and blackmail—and examines 8 defense strategies for preventing these attacks. Read on to learn how to put these strategies to work to protect your company.
Posted: 28 May 2019 | Published: 31 Mar 2019


Integrating Threat Intelligence into Endpoint Security
sponsored by CrowdStrike
WHITE PAPER: As the threat landscape continues to change security teams need all the help they can get to more effectively prevent, detect and respond to threats. In this white paper, learn how incorporating a threat intelligence platform, like CrowdStrike's Falcon X, into the detection and response workflow could help to significantly enhance investigations.
Posted: 05 Jun 2019 | Published: 30 Nov 2018


Autonomous Threat Hunting
sponsored by Verizon
WHITE PAPER: With Verizon's Autonomous Threat Hunting, you can transform massive amounts of system logs and threat data into high-quality, prioritized alerts. Download this white paper to learn more.
Posted: 15 Apr 2019 | Published: 15 Apr 2019


5 Principles of Effective IT Security
sponsored by VMware
WHITE PAPER: Keeping data, applications, and devices secure has always been a top priority for IT security professionals. In order to do this, IT security teams should focus on reducing their attack surface to make their applications less vulnerable to attacks. In this white paper, explore 5 core principles to an effective application security strategy.
Posted: 17 Jun 2019 | Published: 30 Apr 2019


6 Steps to Comprehensive Container Security
sponsored by Trend Micro, Inc.
WHITE PAPER: Container security is challenging, as it covers so many aspects of the development process and supporting infrastructure. The overall strategy can be simply put as "secure outside in". In this white paper, discover 6 steps to implementing the "secure outside in" approach.
Posted: 04 Apr 2019 | Published: 31 Mar 2019

Trend Micro, Inc.

Be the Disrupter, Not the Disrupted
sponsored by Micro Focus & DXC Technology
RESOURCE: On the journey to digitally transform your business, don't forget the essentials: enterprise security and risk management. After all, disrupting the status quo with better business outcomes requires not falling prey to disruptions from cyberthreats. In this infographic, learn the top challenges in cyberthreat defense and how you can overcome them.
Posted: 01 Aug 2019 | Published: 01 Aug 2019

Micro Focus & DXC Technology

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement