Security analytics News
May 03, 2017
Looking at the overall numbers for the contributors to the Verizon Data Breach Investigations Report (DBIR) from the past five years, it would seem like the amount of partners is hitting a plateau, ...
November 30, 2016
Hewlett Packard Enterprise has reached what the firm thinks is a milestone for software application developers interested in cutting edge infrastructure, data-centric computing and software-defined ...
November 15, 2016
SonicWall reflects on the benefits of spinning out of Dell and how it's reengineering its channel focus and product roadmap to match the speed of the security market.
October 31, 2016
Certificate transparency compliance will be mandatory for publicly trusted website certificates in order to be considered secure by Google's Chrome browser.
Security analytics Get Started
Bring yourself up to speed with our introductory content
The emergence of threat hunting programs underscores the importance of the human factor in fighting the most dangerous and costly security threats. Continue Reading
Expert Ed Tittel examines the RSA NetWitness Suite threat intelligence platform, which offers network forensic and analytics tools for investigating incidents and analyzing data. Continue Reading
A constantly evolving threat landscape and a deepening skills crisis has more enterprises looking to a managed security service provider for help handling some of their security requirements. The trend is expected to drive strong demand for MSSPs over the next few years, especially in areas like intrusion prevention and detection systems, distributed denial-of-service mitigation, unified threat management and security information and event management (SIEM). Estimates for the overall size of the global market over the next few years range from the low $20 billion to $35 billion. That makes it one of the fastest growing segments in the security industry. What are the factors CISOs need to consider when choosing a managed security provider and what are some best practices for getting the most out of these relationships?
Enterprises have a range of options for using such services, from managed on-premises or managed customer-premise equipment services to fully outsourced, cloud-hosted options. A hybrid security model has worked for Arlington County in Virginia. The local government's security operations center is managed by in-house engineers who inherently know the network and are better positioned to respond to SIEM alerts from the MSSP. "We preferred the hybrid approach because we had the seasoned staff available to perform this aspect of the security practice," CISO David Jordan said. "It's a positive and successful approach, and the results are repeatable."
Much of the managed security provider growth is being driven by the need for increased security and compliance measures at small to medium-sized businesses. In this issue of Information Security magazine, we look at the evolution of the managed security provider and the best ways to handle these partnerships.Continue Reading
Evaluate Security analytics Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The deployment of machine learning in cybersecurity is helping CIOs reduce false positives, quicken response times and make IS staff more efficient. But it's no magic bullet. Continue Reading
Skill shortages and budget constraints have lead some companies to adopt a hybrid approach to managed security. Is it time for CISOs to start looking for 'expertise as a service'? Continue Reading
In this excerpt from chapter Z of Information Security Analytics, authors Mark Ryan Talabis, Robert McPherson, Inez Miyamoto and Jason L. Martin discuss security intelligence. Continue Reading
Manage Security analytics
Learn to apply best practices and optimize your operations.
As UC platforms become more open to the outside world, IT leaders need to heed newer threats, including guest-access features, federation capabilities and cloud services. Continue Reading
Meeting top security goals is only the first step. Get up to speed on how to avoid common pitfalls in the use of threat intelligence and analytics. Continue Reading
In order to achieve interoperability of security tools and strengthen security, one CIO said that there must be security standards for healthcare information systems. Continue Reading
Problem Solve Security analytics Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A security portfolio shouldn't be used as an alternative to a reporting structure, but it can still be beneficial to enterprises. Expert Mike O. Villegas explains how. Continue Reading
In this episode of SearchSecurity's Risk & Repeat podcast, Tod Beardsley and Rebekah Brown of Rapid7 talk about the IoT threat landscape and improving IoT device security. Continue Reading
Citrix shops looking to enable secure remote access can employ the SmartAccess feature in XenApp and XenDesktop to require endpoint analysis using the company's NetScaler Gateway delivery controller. Continue Reading