eSecurityPlanet's Phil Hollows describes a hypothetical virus attack on a company's email system. Sound possible? Sound familiar? Take a look at what you can do to make sure it doesn't happen to you.
The key to IT security confidence is effective security event management, says guest columnist Phil Hollows. Here's what he recommends to achieve that goal.
A recent Gartner Group study concluded that intrusion detection systems haven't lived up to expectations. But IDS can't work without effect security event management.
A survey by network security management vendor OpenService finds that real-time threat analysis is in great demand, but exceedingly short supply.
Patches cannot be relied upon to deliver effective front-line security because they simply aren't applied in a consistent, effective and timely fashion. Organizations instead should rely on security event management.
IT security professionals are figuring out the next battlefield against the bad guys: threat correlation. Akin to placing sentries on your network battlements, threat correlation solutions monitor sensor data and then identify important threats from across your global network.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?