Continuously updating, learning and optimizing in an ever-changing “threatscape”
As most information security professionals are aware, breaches go from initial point of entry to data extraction in a matter of hours or seconds, yet their detection, analysis, and remediation is usually measured in weeks. New techniques and approaches are needed to shrink this time difference. There is a forest of data to pour over, and today’s Security Information and Event Management (SIEM) tools are primarily passive receivers of data from a multitude of sources. In short, a SIEM is a . . .
From the Spring 2014 Issue
Protecting Your Data
Near-Term Vision of IT Security Threat Monitors
Benjamin Shelton
| Nangwik Services
Don Tobin
|

Leave a Comment