Monitoring

Top 10 cyber-weapons; weaponised IT the preferred attack vehicle once inside

Top 10 cyber-weapons; weaponised IT the preferred attack vehicle once inside

By

Top ten hacker tools identified - misuse of legitimate tools dominates inside the network.

Don't underestimate the idiots - monitoring behaviour on your network

Don't underestimate the idiots - monitoring behaviour on your network

By

How do we spot anomalous system behaviour on our networks that indicates a security breach? That was the theme of last week's SC Magazine UK roundtable aboard HMS President, sponsored by Splunk.

How to find a 'Super Hacker'

How to find a 'Super Hacker'

Anomaly-based detection, rather than signatures or threat intelligence, is more likely to detect nation-state and advanced criminal 'Super Hackers' before they can gain a significant foothold on networks says Peter Cohen.

Faster security understanding with visualisation

Faster security understanding with visualisation

Passive inspection is too slow in today's interconnected, data-rich IT environments, says Thibault Reuille.

Look beyond the darknet to manage supply chain risk

Look beyond the darknet to manage supply chain risk

Vetting staff and contractors, including what they are saying on the internet and the darknet, is vital to protecting your company, says Tim Ramsey.

'The best defence is a good offence' in evolving security, networking market

'The best defence is a good offence' in evolving security, networking market

Dieter Lott discusses the security and networking solutions market and how organisations should be adopting a new proactive approach to security breaches given that IT infrastructure is in a constant state of change.

Living with the enemy

Living with the enemy

Preference for technical solutions, rather than organisational change is resulting in over-investment in stopping cyber-attacks rather than detecting attacks and defending data says James Henry.

Alert fatigue: When your security system cries 'wolf.'

Alert fatigue: When your security system cries 'wolf.'

Too many false positives inevitably reduce response times - and even response numbers - so raise the verification bar and thereby limit them says Chandra Sekar.

Network visibility can prevent you from being the next cyber-security headline

Network visibility can prevent you from being the next cyber-security headline

Better understand what's happening on your network and you'll be better prepared to tackle hostile intruders says Corey Nachreiner.

The true cost of false positives

The true cost of false positives

Implement a structured response with automated systems to bring down the cost of chasing false positives says Brian Foster.

How does PCI DSS 3.0 affect you?

How does PCI DSS 3.0 affect you?

Suspicious activity now needs to be monitored in the entire processing chain, hence implementing PCI DSS 3.0 helps stop attacks before compromises occur says Ross Brewer.

Sound and webcam loggers

Sound and webcam loggers

Every sensor has the potential to be used for malicious logging - and anti-virus based systems aren't an effective defence says Janusz Siemienowicz who adovcates monitoring of behaviour.

Guarding against insider misuse

Guarding against insider misuse

Track and audit changes on the network, especially by privileged users, and make it known that monitoring happens in order to reduce misuse says Michael Fimin.

More questions than answers as BBC outage fuels DDoS talk

More questions than answers as BBC outage fuels DDoS talk

By

The British Broadcasting Corporation was hit by a prolonged outage on its website and iPlayer video-on-demand service (VOD) last weekend, raising questions about the cause and whether it was subjected to a distributed-denial-of-service (DDoS) attack.

Queen's website hosts controversial tracking technique

Queen's website hosts controversial tracking technique

By

Advertising tracking called 'canvas fingerprinting' is used on many websites and identifies unique individuals and their browsing habits and works surreptitiously.

The top 8 ways that privileged accounts are exploited

The top 8 ways that privileged accounts are exploited

Failure to properly monitor and update privileged access is a key vulnerability and Chris Stoneff highlights the leading weaknesses.

Using analytics to secure your network

Using analytics to secure your network

Knowing what's normal on the network will help identify attacks says Dirk Paessler

Monitoring the modern network environment

Importance of network visibility increases as complexity of modern enterprise networks increases: Enterprise Strategy Group survey.

Security and legal professionals claim 24-hour breach notification will not be a complete burden

Security and legal professionals claim 24-hour breach notification will not be a complete burden

By

The proposed 24-hour breach notification law will be a challenge for smaller businesses, but not for enterprises.

Report claims that German police are using commercial spyware

Report claims that German police are using commercial spyware

By

The German police have been reported to be using an intrusion software kit with the capability to monitor and record conversations.

NetWrix launches digital surveillance tool

By

A tool that records user activity for security, compliance, audit and troubleshooting has been launched by NetWrix.

SC Webcasts UK

Sign up to our newsletters

FOLLOW US