Intrusion Prevention Systems
Network Access Control
Endpoint Detection and Response
Data Loss Prevention
Enterprise Mobility Management
Mobile Device Management
Threat Intelligence and Analytics
Identity and Access Management
Cloud Security Best Practices
Phil Hollows - Article Archives - Page 1
Fending Off a Vicious Attack
November 17, 2003
eSecurityPlanet's Phil Hollows describes a hypothetical virus attack on a company's email system. Sound possible? Sound familiar? Take a look at what you can do to make sure it doesn't happen to you.
Boosting Your Security Confidence
September 24, 2003
The key to IT security confidence is effective security event management, says guest columnist Phil Hollows. Here's what he recommends to achieve that goal.
IDS is Dead -- Long Live IDS?
June 27, 2003
A recent Gartner Group study concluded that intrusion detection systems haven't lived up to expectations. But IDS can't work without effect security event management.
IT Budget Woes Hampering Real-Time Responsiveness
March 10, 2003
A survey by network security management vendor OpenService finds that real-time threat analysis is in great demand, but exceedingly short supply.
The Perennial Problem with Patches
February 4, 2003
Patches cannot be relied upon to deliver effective front-line security because they simply aren't applied in a consistent, effective and timely fashion. Organizations instead should rely on security event management.
SECURITY DAILY NEWSLETTER
GET SECURITY NEWS IN YOUR INBOX EVERY DAY
TERMS OF SERVICE
LICENSING AND REPRINTS
Copyright 2017 Quinstreet Inc. All Rights Reserved.