Archive

UEBA for McAfee Enterprise Security Manager

UEBA provides added visibility within SIEM for compliance and user monitoring, improving security alerts, and more insightful investigations. Today’s most advanced security operations use the techno…
Read More ›

OpenDXL Idea Book

The rapid pace of attacks and shortage of expert security talent have driven the security industry to embrace the pooling data resources and orchestrating actions across vendors, open source projects,…
Read More ›

Tackle Insider Threats with a Strong Security Culture

How do you build a strong corporate security culture to tackle insider threats? This paper discusses the internal control, checks, and balances in deterring malicious internal activities. Learn More
Read More ›

Seven Steps to Ease the Pain of Managing a SOC

Running a security operations center (SOC) requires staying ahead of threats, whether you head a vast army of security professionals or operate as a one-person band.  Reassessing your strategy and …
Read More ›

Neutralize Threats with a Collaborative Security Fabric

Security threats are getting more serious, and your business is in the cross-hairs. Learn to neutralize threats across the threat defense lifecycle.
Read More ›

Understanding Ransomware and Strategies to Defeat It

No one wants to be part of a ransomware headline. Learn more about the nature of ransomware and remediation strategies you can take to defend against it.
Read More ›

Operationalizing Threat Intelligence

Behind most legitimate alerts is an adversary using multiple attack techniques to penetrate your infrastructure. Learn how to protect your vital data.
Read More ›

Overcome the Attacker Advantage

Organizations of all sizes are at risk from nation-states, hacktivists, organized crime, malicious and accidental insider threats. The knowledge and capabilities gap between attackers and defenders is mandating fundamental changes to endpoint defenses, cybersecurity’s front line.
Read More ›

When Visibility is Not Enough: Taking Control of Your Data

Visibility is an essential element to any security framework, but organizations also must focus on stopping critical data from leaving the enterprise. Resourceful security professionals are becoming more vigilant and innovative in controlling unauthorized access to and theft of data. Organizations should look for tools that can properly protect against data exfiltration.
Read More ›

Understanding Ransomware and Strategies to Defeat It

Learn the history of ransomware, enabling technologies including virtual currencies and anonymizing networks, and how ransomware works. Includes general guidance for protecting against ransomware.
Read More ›

Filters

Topic
Detailed Content Type
Reset
Page 2 of 3123